SlideShare ist ein Scribd-Unternehmen logo
1 von 10
CONNECT WITH US:
IT: Customized to Your Advantage
Identity Intelligence
THREAT-AWARE IDENTITY AND ACCESS MANAGEMENT
RUSSELL TAIT
Practice Director, Security
Public | Copyright © 2014 Prolifics
CONNECT WITH US:
 Insider incidents cost companies an
average of $750,000 per year
– Employees, contractors, partners
exploiting weak identity controls
 Insider negligence, rather than malicious
behavior is often the cause
– Shared passwords, weak passwords,
passwords on Post-its
Source: IBM and Ponemon Survey of 265 C-Level Executives, Feb 2012, “The Source of Greatest Risk to Sensitive Data”
Insider Breaches Are On The Rise
2Public | Copyright © 2014 Prolifics
CONNECT WITH US:
IT Security’s Dirty Secret
Network &
Perimeter
Internal
&
Web Access
Security Threats & Security Spending Are Unbalanced
% of Attacks % of Dollars
75%
10%
25%
90%
Security
Damage
Security
Spending
of All Damaging Attacks on Information Security
Originate from Inside Trusted Boundaries75%
3Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Security Analytics Is Maturing
What is Security Intelligence?
Security Intelligence
--noun
1. the real-time collection, normalization and analytics of the data
generated by systems, applications and infrastructure that
impacts the IT security and risk posture of an enterprise.
What is Identity Intelligence?
Identity Intelligence
--noun
1. the actionable insight to manage risks and threats from user
activity. The application of analytical monitoring to entitlements,
policies, and access events, in the context of identity risk profiles.
4Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Identity/Access to Identity Intelligence
Future: Assurance
 Security management
 Content driven
 Dynamic, context-based
 Real-time, actionable alerting
Today: Administration
 Operational management
 Compliance driven
 Static, Trust-based
 Reporting/Monitoring is forensic
Monitor Everything
5Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Traditional SIEM Provides Identity Intelligence Adds
What
When
Who
Activities
Results
Behaviors
What was done
Is it OK for THIS user?
Is this user who I think it is?
Outside bad guys Inside careless guys
Inside guys doing bad things
Identity Intelligence Provides Human Context
6Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Extensive Data
Sources
Deep
Intelligence
Exceptionally Accurate and
Actionable Insight+ =
High Priority Offenses
Event Correlation
Activity Baselining &
Anomaly Detection
Offense
Identification
Database Activity
Servers & Hosts
User Activity
Vulnerability Info
Configuration Info
Security Devices
Network & Virtual Activity
Application Activity
 Detecting threats
 Consolidating data silos
 Detecting insider fraud
 Predicting risks against your business
 Addressing regulatory mandates
Security Intelligence: Integrating Across IT Silos
7Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Identity enriched security intelligence:
 Technical features
– Retrieves user identity data including ID mapping
(from an enterprise ID to multiple application user
IDs) and user attributes (groups, roles, departments,
entitlements).
– Queries data (events, flows, offenses, assets)
relative to an enterprise user ID and mapped
application user IDs
– Selects user identities for easy creation of
correlation rules
– Reports on all the activities (using different
appliance user IDs) of an enterprise user
 Use cases
– Privileged user activity monitoring (V7.2)
– Terminated employee access detection
– Separation of duty violation detection
– User account recertification
– Ensuring appropriate access control setting
– Backdoor access detection
Identity
Repository
C/C
++
appl
s
Oth
er
Security Access Manager
for eBusiness
Security Identity
Manager
Databases
Operating
Systems
DatabasesDatabases
Operating
Systems
Operating
Systems
ApplicationsApplications
Networks &
Physical Access
• Identity mapping data and
user attributes
• SIM/SAM Server logs
• Application logs
QRadar – IAM Integration
8Public | Copyright © 2014 Prolifics
CONNECT WITH US:
QRadar Rules Engine
New Rules Engine tests query Reference Sets and Maps :
9Public | Copyright © 2014 Prolifics
CONNECT WITH US:
Contact US
10
www.prolifics.com
310.748.2457
russell.tait@prolifics.com
Public | Copyright © 2014 Prolifics

Weitere ähnliche Inhalte

Was ist angesagt?

SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 

Was ist angesagt? (20)

LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 

Andere mochten auch

Andere mochten auch (11)

Презентация Leo
Презентация LeoПрезентация Leo
Презентация Leo
 
Platon
PlatonPlaton
Platon
 
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
 
Opasne materije
Opasne materijeOpasne materije
Opasne materije
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Webinar messageries ibm connect 2013 publication
Webinar messageries ibm connect 2013 publicationWebinar messageries ibm connect 2013 publication
Webinar messageries ibm connect 2013 publication
 

Ähnlich wie Identity intelligence: Threat-aware Identity and Access Management

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ward Pyles
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
Satyanandan Atyam
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 

Ähnlich wie Identity intelligence: Threat-aware Identity and Access Management (20)

Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence WebinarThe Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
CCA study group
CCA study groupCCA study group
CCA study group
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 

Mehr von Prolifics

Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the Cloud
Prolifics
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections App
Prolifics
 

Mehr von Prolifics (20)

Prolifics SAP Data Assessment
Prolifics SAP Data AssessmentProlifics SAP Data Assessment
Prolifics SAP Data Assessment
 
Prolifics Level 2 Test Lifecycle Automation Services Star West
Prolifics Level 2 Test Lifecycle Automation Services Star WestProlifics Level 2 Test Lifecycle Automation Services Star West
Prolifics Level 2 Test Lifecycle Automation Services Star West
 
PureApplication: System, Service, Software
PureApplication: System, Service, SoftwarePureApplication: System, Service, Software
PureApplication: System, Service, Software
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern Architecture
 
Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the Cloud
 
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
 
Applying an IBM SOA Approach to Manual Processes Automation
Applying an IBM SOA Approach to Manual Processes AutomationApplying an IBM SOA Approach to Manual Processes Automation
Applying an IBM SOA Approach to Manual Processes Automation
 
How Broadcast Music, Inc. Devised and Enabled Enterprise Architecture from Co...
How Broadcast Music, Inc. Devised and Enabled Enterprise Architecture from Co...How Broadcast Music, Inc. Devised and Enabled Enterprise Architecture from Co...
How Broadcast Music, Inc. Devised and Enabled Enterprise Architecture from Co...
 
Using the Power of IBM Tivoli Common Reporting to Make Smart Decisions: The U...
Using the Power of IBM Tivoli Common Reporting to Make Smart Decisions: The U...Using the Power of IBM Tivoli Common Reporting to Make Smart Decisions: The U...
Using the Power of IBM Tivoli Common Reporting to Make Smart Decisions: The U...
 
Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...
Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...
Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...
 
Best Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsBest Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and Applications
 
Smarter Integration Using the IBM SOA Foundation Stack: Best Practices and Le...
Smarter Integration Using the IBM SOA Foundation Stack: Best Practices and Le...Smarter Integration Using the IBM SOA Foundation Stack: Best Practices and Le...
Smarter Integration Using the IBM SOA Foundation Stack: Best Practices and Le...
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. Better
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
 
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
Integrating IBM PureApplication System and IBM UrbanCode Deploy: A GE Capital...
 
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
 
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
 
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast IronIntegrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
 
Recommended Design Considerations for Enterprise Monitoring
Recommended Design Considerations for Enterprise Monitoring Recommended Design Considerations for Enterprise Monitoring
Recommended Design Considerations for Enterprise Monitoring
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections App
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Identity intelligence: Threat-aware Identity and Access Management

  • 1. CONNECT WITH US: IT: Customized to Your Advantage Identity Intelligence THREAT-AWARE IDENTITY AND ACCESS MANAGEMENT RUSSELL TAIT Practice Director, Security Public | Copyright © 2014 Prolifics
  • 2. CONNECT WITH US:  Insider incidents cost companies an average of $750,000 per year – Employees, contractors, partners exploiting weak identity controls  Insider negligence, rather than malicious behavior is often the cause – Shared passwords, weak passwords, passwords on Post-its Source: IBM and Ponemon Survey of 265 C-Level Executives, Feb 2012, “The Source of Greatest Risk to Sensitive Data” Insider Breaches Are On The Rise 2Public | Copyright © 2014 Prolifics
  • 3. CONNECT WITH US: IT Security’s Dirty Secret Network & Perimeter Internal & Web Access Security Threats & Security Spending Are Unbalanced % of Attacks % of Dollars 75% 10% 25% 90% Security Damage Security Spending of All Damaging Attacks on Information Security Originate from Inside Trusted Boundaries75% 3Public | Copyright © 2014 Prolifics
  • 4. CONNECT WITH US: Security Analytics Is Maturing What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization and analytics of the data generated by systems, applications and infrastructure that impacts the IT security and risk posture of an enterprise. What is Identity Intelligence? Identity Intelligence --noun 1. the actionable insight to manage risks and threats from user activity. The application of analytical monitoring to entitlements, policies, and access events, in the context of identity risk profiles. 4Public | Copyright © 2014 Prolifics
  • 5. CONNECT WITH US: Identity/Access to Identity Intelligence Future: Assurance  Security management  Content driven  Dynamic, context-based  Real-time, actionable alerting Today: Administration  Operational management  Compliance driven  Static, Trust-based  Reporting/Monitoring is forensic Monitor Everything 5Public | Copyright © 2014 Prolifics
  • 6. CONNECT WITH US: Traditional SIEM Provides Identity Intelligence Adds What When Who Activities Results Behaviors What was done Is it OK for THIS user? Is this user who I think it is? Outside bad guys Inside careless guys Inside guys doing bad things Identity Intelligence Provides Human Context 6Public | Copyright © 2014 Prolifics
  • 7. CONNECT WITH US: Extensive Data Sources Deep Intelligence Exceptionally Accurate and Actionable Insight+ = High Priority Offenses Event Correlation Activity Baselining & Anomaly Detection Offense Identification Database Activity Servers & Hosts User Activity Vulnerability Info Configuration Info Security Devices Network & Virtual Activity Application Activity  Detecting threats  Consolidating data silos  Detecting insider fraud  Predicting risks against your business  Addressing regulatory mandates Security Intelligence: Integrating Across IT Silos 7Public | Copyright © 2014 Prolifics
  • 8. CONNECT WITH US: Identity enriched security intelligence:  Technical features – Retrieves user identity data including ID mapping (from an enterprise ID to multiple application user IDs) and user attributes (groups, roles, departments, entitlements). – Queries data (events, flows, offenses, assets) relative to an enterprise user ID and mapped application user IDs – Selects user identities for easy creation of correlation rules – Reports on all the activities (using different appliance user IDs) of an enterprise user  Use cases – Privileged user activity monitoring (V7.2) – Terminated employee access detection – Separation of duty violation detection – User account recertification – Ensuring appropriate access control setting – Backdoor access detection Identity Repository C/C ++ appl s Oth er Security Access Manager for eBusiness Security Identity Manager Databases Operating Systems DatabasesDatabases Operating Systems Operating Systems ApplicationsApplications Networks & Physical Access • Identity mapping data and user attributes • SIM/SAM Server logs • Application logs QRadar – IAM Integration 8Public | Copyright © 2014 Prolifics
  • 9. CONNECT WITH US: QRadar Rules Engine New Rules Engine tests query Reference Sets and Maps : 9Public | Copyright © 2014 Prolifics
  • 10. CONNECT WITH US: Contact US 10 www.prolifics.com 310.748.2457 russell.tait@prolifics.com Public | Copyright © 2014 Prolifics

Hinweis der Redaktion

  1. Chevron - 2 billion log and events per day reduced to 25 high priority offenses. Automating the policy monitoring and evaluation process for configuration changes in the infrastructure. Real-time monitoring of all network activity, in addition to PCI mandates
  2. QRadar now supports integrations with our IAM solution beyond SIM/SAM logs. Qradar has built in uses cases for retrieving identity data for use cases such as privileged user activity monitoring and terminated employee access detection, to name just a couple.