SlideShare a Scribd company logo
1 of 17
Improve ROI on Security and Compliance Management June 7, 2010
How Much It Cost To Be Secure? First Level Third Level Second Level *Calculated on 2080 Hours/Year Deeper it goes,  longer is the Exposure and the  associated Risk Cost Standard IT Security Model Resource Type Ownership % Hourly Cases Hourly Cost* Help Desk & Service Desk Low Skill Resources High Turnaround 68% 4 22$ IT Professionals Platform Specific In-House Personnel 26% 1,5 44$ Security Officers Technology Specific Mostly External 6% 0,13 112$
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],And Why?
Goal of IT Management Become an Efficient Business Enabler Operational Efficiency Business Enablement Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Cost-Centric and Tactical with Marginal Services Current State: Expensive and Tactical with Limited Perceived Value Sub-Optimal: Aligned To Business Goals But Expensive Efficient Business Enabler A Low Cost Provider C Expensive Business Enabler B Low Value Provider D
Management’s Dilemma Operational Efficiency vs. Business Enablement Significant up-front investments and the need for profound changes  jeopardize or delay expected cost reductions . Off-shoring and outsourcing, combined with little investment in processes, often  forsake agility and business enablement . “ The Cost Cutter” “ The Framework Adopter” Operational Efficiency Business Enablement Operational Efficiency Business Enablement
A Different Approach IT Process Automation Provides a Direct Route to Improve Efficiency IT Process Automation  enables you to: 1 Reduce Inefficiencies from Current Security Mgmt Tools ,[object Object],[object Object],2 Integrate Tools within IT Security and Operations 3 ,[object Object],[object Object],Integrate the Business into IT Security Mgmt Processes ,[object Object],[object Object],[object Object],[object Object],[object Object],Operational Efficiency Business Enablement 1 2 3
The NetIQ Security Vision Audit Monitor Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Monitor and Manage User Activity Control and Audit Configuration Manage and Enforce Change Control Goals Challenges Our Approach NetIQ Solution NetIQ Solution NetIQ Solution All of those through Automation
Control and Audit Configuration Primary Goal: Protect systems, applications and data in accordance with their business value and satisfy compliance mandates NetIQ Delivers Real-time event correlation reduces alert volumes while highlighting critical events, improving incident management while reducing costs. TRACE™ technology delivers log management, protects the chain of custody, and provides trend analysis and forensics to meet evolving mandates. Powerful auditing of user activity and access controls helps meet compliance mandates and address both inside and outside threats. Effective detection at both the host and network level provides better protection of corporate data and demonstrable oversight of change controls. What's Needed Event Correlation and Analysis Log Management and Forensics Access Control and User Monitoring Change and Threat Detection Challenges What's Needed 1. Security events and alerts often overwhelm security staff, inhibiting effective security incident management. Event Correlation and Analysis 2. Evolving mandates require more than simple log consolidation, to encompass integrity of data, chain of custody, and forensic reporting. Log Management and Forensics 3. Effective protection of corporate data is dependent on user activity monitoring, which is often inhibited by native capabilities. Access Control and User Monitoring 4. Intrusion detection and log monitoring are insufficient to meet the evolving mandates for data protection and change control. Change and Threat Detection
Monitor and Manage User Activity Primary Goal: Maintain the infrastructure, applications, user accounts, and security per business requirements NetIQ Delivers A prevention-oriented, proxy-based administration solution delivers higher availability than that of system-wide backup and restoration. Non-hierarchical, rules-based delegation simplifies safely granting privileges to users. Automated tasks triggered by events streamline routine administrative tasks, saving time and improving service. Automation and repeatability, along with Active Directory and Unix users optimization, assures business availability and satisfied end users. What's Needed Prevention and Recovery Delegated Administration Administrator Task Automation Migration and Optimization Challenges What's Needed 1. Administrative errors and malicious acts threaten the integrity and reliability of systems and services. Prevention and Recovery 2. Native tools make it impractical to enable non-administrators to make routine or low-risk changes. Delegated Administration 3. Manual, routine tasks often consume valuable skilled resources. Administrator Task Automation 4. Diversity, complexity and emerging technologies increase the time to deploy and operate systems management tools. Migration and Optimization
Manage and Enforce Change Control Primary Goal: Real time enforcement of an organization policy throughout the different layers of the IT infrastructure. Without stopping the services operations  CalCom Delivers Automated Process for Real Time Policies Enforcement within the different IT Layers, not stopping the normal operations An extensible library with hundreds of Policy Process Protection Rules covering OSs, Applications, Users Behavior, Network Connections  Learning Mode to understand how and element should behave. Unparalleled capabilities in Monitoring, Auditing, Access and Change control  Built-in reports, Regulatory Compliance Reports, Policy Center © – Gap Analysis Report and Compliance Dashboard © What's Needed Hardening Solutions that doesn’t harm or stop the Services Operations Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access Easily p rovide Real Time Policies monitoring and implementation Unparalleled reporting capabilities  on regulatory compliance Challenges What's Needed 1. Real time enforcement of an organization policies on the IT Infrastructure layers, without harming the Services Operation Hardening Solutions that doesn’t harm or stop the Services Operations 2. Protect and enforce the organization’s Policy Processes through verifying the User behavior Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access 3. Monitor, alert and prevent policies break, rolling back to any change of the hardened element following the Policies Easily p rovide Real Time Policies monitoring and implementation 4. Be able to produce a wide range of regulatory reports, gap analysis, what if analysis and compliance dashboard Unparalleled reporting capabilities  on regulatory compliance
All of Those Through Automation Workflow Automation Engine NetIQ Products Message Bus, Resource Model, CMDB 3 rd  Party Best-of-Breed products Run Books (Event Correlation, Fault Recovery, Routine Server Restarts, etc. ) Processes (ITIL Incident Management, Change Management, DR testing, etc.) Correlation Engine AM SM/CG SCM DRA SCOM HPOM Remedy Smarts Adapters Bi-directional data collection and control Activity Libraries Workflow building blocks that control other tools Process Templates Provides built-in knowledge Presentation Layer Consoles tailored to specific users Independent Engines Allow data processing scalability Resource Mgmt DB  Normalizes data from diverse tools Ops Console Config Console Reports … …
At The End This is What Really Counts
Real World Example On Self Password Reset
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Cast and The Crew
Total Economic Impact ROI and Payback Period for NetIQ IT Security Process Automation ,[object Object],[object Object],F ORRESTER ® Summary financial results Original estimate Risk-adjusted ROI 150% 141% Payback period  (yrs) 1.1 1.2 Total Benefits  (PV) $1,232,563 $1,192,083 Total costs  (PV) ($493,847) ($495,549) Total  (NPV) $738,716 $696,534
Next Steps with NetIQ & CalCom © 2010 NetIQ Corporation. All rights reserved. Your Need Action Items Learn More about IT Process Automation ,[object Object],[object Object],[object Object],Validate Our  Approach ,[object Object],[object Object],[object Object],Build a Business Case for NetIQ ,[object Object],[object Object],[object Object],Assess NetIQ for a Technical Fit ,[object Object],[object Object],[object Object],Prepare for  IT Process Automation ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
Kashif Rana ACCA
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
Cheng Olayvar
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
icomply
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
Ahmed Abdul Hamed
 

What's hot (20)

It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 

Viewers also liked

NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
mbmobile
 
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Luisa Fernanda
 
Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summary
pejansen
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summary
pejansen
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 review
pejansen
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
pejansen
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 review
pejansen
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 review
pejansen
 
Chapter 9 review
Chapter 9 reviewChapter 9 review
Chapter 9 review
pejansen
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 review
pejansen
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 review
pejansen
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summary
pejansen
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summary
pejansen
 
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodologyエスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
Nozomi Ikeya
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1
pejansen
 

Viewers also liked (20)

NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
 
Pirates Boot Camp 1st
Pirates Boot Camp 1st Pirates Boot Camp 1st
Pirates Boot Camp 1st
 
Vto 13 December 2010
Vto 13 December 2010Vto 13 December 2010
Vto 13 December 2010
 
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
 
Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summary
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summary
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 review
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 review
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 review
 
Chapter 9 review
Chapter 9 reviewChapter 9 review
Chapter 9 review
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 review
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 review
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summary
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summary
 
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodologyエスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
 
ROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena PrevitaliROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena Previtali
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1
 
Julian assange
Julian assangeJulian assange
Julian assange
 
Anatomi publikasi internasional
Anatomi publikasi internasionalAnatomi publikasi internasional
Anatomi publikasi internasional
 

Similar to How much does it cost to be Secure?

Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
guest879489
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
guest879489
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
guest879489
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 

Similar to How much does it cost to be Secure? (20)

IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Kiran_CV
Kiran_CVKiran_CV
Kiran_CV
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Mark Norton (Idiom Limited)
Mark Norton (Idiom Limited)Mark Norton (Idiom Limited)
Mark Norton (Idiom Limited)
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
Performance measurement and exception management in investment processing
Performance measurement and exception management in investment processingPerformance measurement and exception management in investment processing
Performance measurement and exception management in investment processing
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

How much does it cost to be Secure?

  • 1. Improve ROI on Security and Compliance Management June 7, 2010
  • 2. How Much It Cost To Be Secure? First Level Third Level Second Level *Calculated on 2080 Hours/Year Deeper it goes, longer is the Exposure and the associated Risk Cost Standard IT Security Model Resource Type Ownership % Hourly Cases Hourly Cost* Help Desk & Service Desk Low Skill Resources High Turnaround 68% 4 22$ IT Professionals Platform Specific In-House Personnel 26% 1,5 44$ Security Officers Technology Specific Mostly External 6% 0,13 112$
  • 3.
  • 4. Goal of IT Management Become an Efficient Business Enabler Operational Efficiency Business Enablement Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Cost-Centric and Tactical with Marginal Services Current State: Expensive and Tactical with Limited Perceived Value Sub-Optimal: Aligned To Business Goals But Expensive Efficient Business Enabler A Low Cost Provider C Expensive Business Enabler B Low Value Provider D
  • 5. Management’s Dilemma Operational Efficiency vs. Business Enablement Significant up-front investments and the need for profound changes jeopardize or delay expected cost reductions . Off-shoring and outsourcing, combined with little investment in processes, often forsake agility and business enablement . “ The Cost Cutter” “ The Framework Adopter” Operational Efficiency Business Enablement Operational Efficiency Business Enablement
  • 6.
  • 7.
  • 8. Control and Audit Configuration Primary Goal: Protect systems, applications and data in accordance with their business value and satisfy compliance mandates NetIQ Delivers Real-time event correlation reduces alert volumes while highlighting critical events, improving incident management while reducing costs. TRACE™ technology delivers log management, protects the chain of custody, and provides trend analysis and forensics to meet evolving mandates. Powerful auditing of user activity and access controls helps meet compliance mandates and address both inside and outside threats. Effective detection at both the host and network level provides better protection of corporate data and demonstrable oversight of change controls. What's Needed Event Correlation and Analysis Log Management and Forensics Access Control and User Monitoring Change and Threat Detection Challenges What's Needed 1. Security events and alerts often overwhelm security staff, inhibiting effective security incident management. Event Correlation and Analysis 2. Evolving mandates require more than simple log consolidation, to encompass integrity of data, chain of custody, and forensic reporting. Log Management and Forensics 3. Effective protection of corporate data is dependent on user activity monitoring, which is often inhibited by native capabilities. Access Control and User Monitoring 4. Intrusion detection and log monitoring are insufficient to meet the evolving mandates for data protection and change control. Change and Threat Detection
  • 9. Monitor and Manage User Activity Primary Goal: Maintain the infrastructure, applications, user accounts, and security per business requirements NetIQ Delivers A prevention-oriented, proxy-based administration solution delivers higher availability than that of system-wide backup and restoration. Non-hierarchical, rules-based delegation simplifies safely granting privileges to users. Automated tasks triggered by events streamline routine administrative tasks, saving time and improving service. Automation and repeatability, along with Active Directory and Unix users optimization, assures business availability and satisfied end users. What's Needed Prevention and Recovery Delegated Administration Administrator Task Automation Migration and Optimization Challenges What's Needed 1. Administrative errors and malicious acts threaten the integrity and reliability of systems and services. Prevention and Recovery 2. Native tools make it impractical to enable non-administrators to make routine or low-risk changes. Delegated Administration 3. Manual, routine tasks often consume valuable skilled resources. Administrator Task Automation 4. Diversity, complexity and emerging technologies increase the time to deploy and operate systems management tools. Migration and Optimization
  • 10. Manage and Enforce Change Control Primary Goal: Real time enforcement of an organization policy throughout the different layers of the IT infrastructure. Without stopping the services operations CalCom Delivers Automated Process for Real Time Policies Enforcement within the different IT Layers, not stopping the normal operations An extensible library with hundreds of Policy Process Protection Rules covering OSs, Applications, Users Behavior, Network Connections Learning Mode to understand how and element should behave. Unparalleled capabilities in Monitoring, Auditing, Access and Change control Built-in reports, Regulatory Compliance Reports, Policy Center © – Gap Analysis Report and Compliance Dashboard © What's Needed Hardening Solutions that doesn’t harm or stop the Services Operations Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access Easily p rovide Real Time Policies monitoring and implementation Unparalleled reporting capabilities on regulatory compliance Challenges What's Needed 1. Real time enforcement of an organization policies on the IT Infrastructure layers, without harming the Services Operation Hardening Solutions that doesn’t harm or stop the Services Operations 2. Protect and enforce the organization’s Policy Processes through verifying the User behavior Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access 3. Monitor, alert and prevent policies break, rolling back to any change of the hardened element following the Policies Easily p rovide Real Time Policies monitoring and implementation 4. Be able to produce a wide range of regulatory reports, gap analysis, what if analysis and compliance dashboard Unparalleled reporting capabilities on regulatory compliance
  • 11. All of Those Through Automation Workflow Automation Engine NetIQ Products Message Bus, Resource Model, CMDB 3 rd Party Best-of-Breed products Run Books (Event Correlation, Fault Recovery, Routine Server Restarts, etc. ) Processes (ITIL Incident Management, Change Management, DR testing, etc.) Correlation Engine AM SM/CG SCM DRA SCOM HPOM Remedy Smarts Adapters Bi-directional data collection and control Activity Libraries Workflow building blocks that control other tools Process Templates Provides built-in knowledge Presentation Layer Consoles tailored to specific users Independent Engines Allow data processing scalability Resource Mgmt DB Normalizes data from diverse tools Ops Console Config Console Reports … …
  • 12. At The End This is What Really Counts
  • 13. Real World Example On Self Password Reset
  • 14.
  • 15.
  • 16.
  • 17.

Editor's Notes

  1. Level 1 – Focus on High Turnaround and Training Costs Level 3 are usually not fully onsite – This extend Time to Exposure Focus on reducing Time to Exposure Different Tools requires Different Skills and Different Training Focus on the Human Element – The human make mistakes by design © 2008 NetIQ Corporation. All rights reserved.
  2. © 2008 NetIQ Corporation. All rights reserved.