SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Centrify
Centralizing the Control, Security and Audit
                    of
      UNIX, Linux and Mac Systems




                                       Barry Scott
                                       Technical Director
                                       Centrify EMEA
                                       barry.scott@centrify.com
                                       +44 7770 430 007
Agenda
• Introduction
• The Centrify Vision
• Access Governance and Centralisation
• Automated Security Enforcement
      • Protect Systems
      • Authorize Privilege
      • Audit Systems

• Centrify Solutions




© 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.   SLIDE 2
The Centrify Vision
Control, Secure and Audit Access to Cross-Platform Systems and Applications

                              Centrify the Enterprise




            Leverage infrastructure you already own – Active Directory – to:

           Control                     Secure                         Audit
      What users can access     User access and privileges       What the users did
Identity Management Today
                                                            Active Directory
                      Windows
          PC’s and Servers
                                                                                                 Exchange Server




                                            Unix / Linux / Mac / Enterprise & Web Applications




© 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                             SLIDE 4
Identity Management with Centrify
                                                         Active Directory
                      Windows
          PC’s and Servers
                                                                            Exchange Server




Centralised Identity and Access Management with Centrify
• ALL identity and privilege information stored, managed and audited in Active Directory
• No Additional Identity Store or Server, therefore no synchronisation of identities
• Leverage existing infrastructure and Best Practices in AD
© 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                        SLIDE 5
Banking and Finance – We’ve done it before…
• Very large and time-sensitive projects
    • Touching systems that contain critical and strategic information assets – the ―Crown
      Jewels‖

• All customers undertook a deep and comprehensive competitive and technical
  evaluation with Centrify winning on each occasion due to our technical
  superiority, ease of deployment and simplicity.
    • “During our technical evaluation and score-carding process involving 6 vendors,
      Centrify came top in 14 out of 15 technical score-card categories. The vendor ranked
      second was a considerable way behind Centrify both technically and from an ease of
      deployment perspective due to Centrify’s unique zoning capabilities”

    • “We were able to deploy and join to Active Directory up to 500 systems per night with
      Centrify once our architectural design was complete.”

    • “During our PoC, it was very evident that Centrify Suite is built on a common
      architecture and code base, whereas other solutions we tested were clearly a bunch
      of acquired technologies loosely glued together with the only integration points being
      marketing !”



© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                  SLIDE 6
Recurring Regulatory Requirements and Audit Points
• Common recurring Regulatory Requirements and Audit Points
  we are helping our customers address:
     • Sharing of generic *nix accounts with powerful (very often root)
                                                                                      DirectControl
       privileges, by a number of individuals, resulting in a lack of
       accountability due to the use of shared passwords

     • Password aging is typically not enforced on many privileged and non-           DirectControl

       privileged user accounts in a *nix environment

     • Password complexity checks are very rarely implemented on *nix                 DirectControl

       systems resulting in insecurities from a system access perspective

     • Activities undertaken by IT Staff as the ―root‖ user (as well as other
                                                                                      DirectControl
       privileged users; DBA’s etc) are typically not logged or captured
                                                                                      DirectAudit
       resulting in a lack of audit trail resulting in failed audits as they relate
       to regulatory and compliance requirements




© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                     SLIDE 7
Recurring Regulatory Requirements and Audit Points
• Common recurring Regulatory Requirements and Audit Points
  we are helping our customers address:
     • Privileged users will typically be assigned privileged accounts which
                                                                                DirectAuthorize
       very often lack any control over what commands or actions they are
       allowed to undertake on the *nix systems

     • The ability to undertake account recertification as well as a process     DirectControl

       to enforce account recertification is typically not implemented but is    DirectAuthorize

       a requirement for audit and regulatory compliance

     • Where a separate directory has already been implemented for the
                                                                                 DirectControl
       management of identities in the *nix environment, synchronization
       of accounts and creation and deletion of accounts on *nix servers
       does not always complete successfully or in a timely manner, thus
       resulting in inconsistences in relation to system access.




© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                 SLIDE 8
Access Governance Starts with Centralization
     Centralize Security, Identity and Access Management within Active Directory

                Identity Consolidation                                                 Privileged Access Management

  • De-duplicate identity infrastructure                                              • Associate privileges with individuals
• Get users to login as themselves / SSO                                            • Enforce ―least access & least privileges‖
      • Single security policy definition                                                • Audit privileged user activities
 • Single point of administrative control                                           • Isolate systems & encrypt data-in-motion




                                                                                              dba
                                                 SysAdmin                                           root
                                                             DBAs                     websa
                               Users                     Groups     Unix Profiles         User Roles       Security
                                                                                                           Policies
                                                    Active Directory-based Security Infrastructure




                   Protecting Systems. Authorizing Privileges. Auditing Activities.
© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                                        SLIDE 9
Centralized Management Presents Challenges

                                        Centralization        Corresponding Challenges
                                                   Goals
                                                           • Legacy namespace is complex and
                                                             different across many systems
  • Centralized UNIX Identities
                                                           • Individual system differences make
                                                             centralization difficult
  • Establishing a global namespace
                                                           • Access rights are typically
  • Limited access granted where needed                      granted too broadly

  • Locked down privileged accounts                        • Granting privileges requires a
                                                             simple way to create and
  • Privileges granted to individual users                   manage the policies

  • Audit privileged activities                            • Integration with existing
                                                             management processes



© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                            SLIDE 10
Infrastructure as a Service Brings More, New Challenges

Adoption of IaaS is growing in the Enterprise
      • Yankee Group says 24% are using IaaS, 60% are planning to use in 12 months

      • Adoption trends are first in Development, then QA/Test, eventually to Production

Security remains the primary issue blocking Enterprise use
      • Cloud Security Alliance identified 7 threats to cloud computing

      • Gartner identified privileged user access as the #1 cloud computing risk

The Challenges to Enterprise-use inexpensive public IaaS are very
familiar
      • Cloud server security is left to the customer

      • Cloud server templates have common privileged accounts and passwords

      • Cloud servers are typically deployed on public networks with dynamic IP addresses

      • Access controls and activity auditing are left to the customer

      • Applications hosted on these servers don’t enable end user single sign-on access

© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                     SLIDE 11
The Solution is to Automate Security Enforcement
 By Leveraging Active Directory as the centralized security infrastructure

Protect Systems
      • Group Policy enforces system security policies

      • IPsec based network protection policies
                                                                   Protect
      • AD management of privileged accounts

Authorize Privileges
      • AD-based unique identity                         Audit
      • Role-based access and privilege

      • AD enforces separation of duties

Audit Activities
      • Audit all user activity                                  Authorize
      • Report on access rights and privileges

Resulting in automated security for the Enterprise
© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                   SLIDE 12
Leverage Active Directory to Automate Security Enforcement

     PROTECT SYSTEMS


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.            SLIDE 13
Active Directory-based Computer Identity
Active Directory services provide the foundation for Enterprise security
      • Highly distributed, fault tolerant directory infrastructure designed for scalability

      • Supports large Enterprises through multi-Forest, multi-Domain configurations

      • Kerberos-based authentication and authorization infrastructure providing SSO

Computer systems join Active Directory
      • Establishing individual computer accounts for each system

      • Automatically enrolling for PKI certificates and establishing Enterprise trust

      • Enabling authorized Active Directory Users to login, online & offline

      • Controlling user authentication for both interactive and network logins


                                                          HR                      Field Ops




© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                         SLIDE 14
Security Policies Auto-Enforced by Group Policy
Consistent security and configuration policies need to be enforced on all
Windows, UNIX, Linux and Mac systems
      • Group Policy is automatically enforced at system join to Active Directory

      • Group Policy defines standard baseline and periodically reapplies it

      • User Group Policy is enforced at user login

Group Policies enforce:
      • System authentication configuration

      • System Banner settings

      • Screen Saver & Unlock policies

      • SSH policies control remote access security

      • Firewall policies control machine access

      • Mac OS X specific policies control the
        system and user’s environment


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                              SLIDE 15
Prevent Data Breaches from External Threats
• IPsec Transport Mode isolates the entire enterprise, preventing access by
  rogue or untrusted computers and users — reducing the attack surface

• Network-level access controls are much more important when:
      • Enterprise network boundaries become porous as they include wireless and grow exponentially

      • Users’ work becomes more virtual, accessing corporate resources from mobile / remote locations

• Software- and policy-based approach lets you avoid an expensive VLAN and
  network router ACLs approach
                                                                     Trusted
                                          Corporate Network




                                    Rogue Computer



                                                              Managed             Managed
                                                              Computers           Computer




© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                SLIDE 16
Isolate Sensitive Servers & Protect Data-in-Motion
IPsec authentication policies logically isolate sensitive servers independent of
physical network location
      • Sensitive information systems are isolated based on PKI identities and AD group membership

IPsec encryption protects data-in-motion without modifying older applications
      • Enforce peer-to-peer, network-layer encryption for applications that transport sensitive information


                                                       AH         ESP
                                   IP Header                              Protected Data     ESP Trailer
                                                     Header      Header

                                                                                     Encrypted
                                                 Authenticated

                                                                                                           Encryption
                                                                                                           Each packet is encrypted
                                                                                                           preventing attackers from
                                                                                                           seeing any sensitive
                                                                                                           information




© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                                      SLIDE 17
Leverage Active Directory to Automate Security Enforcement

     AUTHORIZE PRIVILEGES


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.            SLIDE 18
Active Directory Centralizes Account Management
   • UNIX Account administration leverages centralized Active Directory
       processes and automation

   • Account and authentication policies are enforced on all systems

                                                              Existing Identity
                                                            Management Solutions




Active Directory Users and Computers
                                                                                                        MMC Admin Console
                                      Provisioning
                                       APIs/Tools
                                                                          Unix Command Line Interface




    Active Directory-based Security Infrastructure



   © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                             SLIDE 19
Centralize The Most Complex UNIX Environments
Zones uniquely simplifies the integration and centralized management of
complex UNIX identity and access permissions into Active Directory
       • Only solution designed from the ground up to support migration of multiple UNIX environments and
         namespaces into a common Directory

       • Zones provides unique ability to manage UNIX identity, UNIX access rights and delegated
         administration

Centrify supports native AD delegation for separation of duties
       • Zones create natural AD boundaries for delegated UNIX administration of a group of systems
         through AD access controls on UNIX Zone objects

Seamlessly integrate administration into existing IDM systems
       • AD Group membership controls the provisioning of UNIX profiles granting access and privileges

       • IDM systems simply manage AD Group Membership in order to control the environment
            Engineering                              Finance   HR                       Retail




     Active Directory-based Security Infrastructure


© 2004-2011. CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                  SLIDE 20
Ensure Separation of Administrative Duties
Separation of AD and Unix Admins
      • User’s Unix profile are stored independent of AD
                                                                                                            UNIX
        User object                                                       Administration Zone     Administrator

      • Unix Admins don’t need rights to manage AD
        User objects, only Unix profiles                                                          HR Zone




Separation of Unix Departmental Admins
      • Each Zone is delegated to the appropriate Unix
        Admin

      • Unix Admins only need rights to manage Unix
        profiles within their own Zone                                              Fred        Joan
                                                                               Active Directory



                                                         AD & Windows
                                                         Administration
© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                 SLIDE 21
Least Access is Enforced Through Zones
• System Access is denied unless explicitly granted
• Access is granted to a Zone (a logical group of systems)
• Users’ UNIX Profiles within a Zone are linked to the AD User

             Administration Zone                 Accounting Zone        HR Zone                       Field Ops Zone




       fredt                    fthomas                  jlsmith         joans                        joans
       UID = 10002              UID = 31590              UID = 61245     UID = 4226                   UID = 200




                                      Fred                             Joan
  AD Users, Computers & Groups                                                                Active Directory


                                                                                      One Way Trust
© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                                 SLIDE 22
Active Directory-based User Login
Smartcard login policies are also enforced
      • DirectControl for OS X supports CAC or PIV smartcard login to Active Directory granting Kerberos
        tickets for SSO to integrated services

      • Users configured for Smartcard interactive login only are not allowed to login with a password,
        however Kerberos login after smartcard is allowed

Kerberos provides strong mutual
authentication to Servers after desktop
smartcard login




© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                    SLIDE 23
Lock Down Privileged Accounts
Lockdown privileged and service accounts within Active Directory
      • Online authentication requires AD-based password validation

      • Offline authentication uses the local cached account

      • Passwords are synchronized to local storage for
        single user mode login



Leverage role-based privilege grants to                               root                root
eliminate risks exposed by these accounts
      • Eliminating need to access privileged accounts

      • Enables locking down these account passwords




                                                                         UNIX_root
                                                                       Active Directory



© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                      SLIDE 24
Associate Privileges with Named Individuals
Centralized role-based policy management
      • Create Roles based on job duties

      • Grant specific access and elevated privilege rights

      • Eliminate users’ need to use privileged accounts      Roles      Backup Operator Rights

      • Secure the system by granularly controlling how the              Availability
                                                                         • Maintenance window only
        user accesses the system and what he can do           Backup
                                                                         PAM Access
                                                              Operator   • ssh login
Unix rights granted to Roles                                             Privileged Commands
                                                                         • tar command as root
      • Availability – controls when a Role can be used                  Restricted Environment
                                                                         • Only specific commands
      • PAM Access – controls how users access UNIX system
        interfaces and applications

      • Privilege Commands – grants elevated privileges       Resources                HR Zone
        where needed

      • Restricted Shell - controls allowed commands in the
        user’s environment


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                       SLIDE 25
Grant Privileged Commands to Users via Roles
• Web Admins are assigned root privileges for specific Apache management
    operations




© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                     SLIDE 26
Role Assignments Ensure Accountability
                                                              AD Users & Groups
Role Assignment
                                                                Fred     Joan   Backup
      • Active Directory Users are assigned to a Role,
        eliminating ambiguity, ensuring accountability

      • Active Directory Groups can be assigned to a Role,
                                                              Roles
        simplifying management                                              Backup Operator Rights
                                                                            Availability
      • User assignment can be date/time limited – enabling                 • Maintenance window only
                                                              Backup
        temporary rights grants                                             PAM Access
                                                              Operator      • ssh login
                                                                            Privileged Commands
                                                                            • tar command as root

Assignment Scope                                                            Restricted Environment
                                                                            • Only specific commands
      • Roles apply to all computers within a
        Zone/Department

      • Users within a Role can be granted Rights to          Resources                   HR Zone

        Computers serving a specific Role (DBA -> Oracle)

      • Assignment can be defined for a specific Computer


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                          SLIDE 27
Leverage Active Directory to Automate Security Enforcement

     AUDIT ACTIVITIES


© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.            SLIDE 28
System Logs and Events Provide Visibility
           Show me accounts not used in last 90 days.                                  • Syslog rollup brings in
                                                                                         operational intelligence from
                        Are there any systems where Centrify is not connected?
                                                                                         other systems, apps, SIEM,
                                                                                         security devices, etc.
              How long was a user in a role?
                                                                                      Metrics and Alerts

                Active
                                                                                      Local and AD User Accounts
Data                                       Config files
               Directory
                                                                                      Authentication Attempts

                                                                                      Centrify Zone and Role Assignments
*NIX Syslog                 /etc/passwd
                                                                                      Centrify Health and Configuration

                                                                                      Dashboards and Reports

              I want to see all failed login attempts.                                 • Shows changes in AD, *nix
                                                                                         login attempts, Windows login
                           Are there any newly created local accounts on my server?      attempts, Centrify agent
                                                                                         health, etc.

           Who zone-enabled this user?


 © 2004-2011. CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                                           SLIDE 29
High Definition Visibility Provided by Session Recording
                                                          • Establish User
                                                            accountability

                                                          • Tracks all user access
                                                            to systems

                                                          • Centrally search
                                                            captured sessions




 © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                         SLIDE 30
Reporting Simplified with Centralized Management
Authorization and Access Reports can be centrally created:
       Reporting on user account properties

       Detailing user role assignments and privilege command rights

       Showing user access rights to computers



Active Directory based
reporting
       Reports are generated on
        live, editable AD information

       Administrators can take
        snapshots of a report



© 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                 SLIDE 31
Centrify Solutions and the
Challenges They Address
Centrify Products… Delivered as the Centrify Suite
                                     EXPRESS   STANDARD   ENTERPRISE   PLATINUM


DirectManage                                                                      Single Sign-On
Centralized Management and                                                        For Applications
Administration

                                                                                  With all editions you can
                                                                                  purchase SSO modules for:
DirectControl                                                                     • Apache & J2EE web apps
Consolidate Identities and
Centralize Authentication                                                         • SAP NetWeaver & GUI
                                                                                  • DB2


DirectAuthorize                                                                   Centrify-Enabled
Role-based Authorization and
Privilege Management
                                                                                  Open Source Tools

                                                                                  All editions also include free,
                                                                                  Centrify-enabled versions of:
DirectAudit                                                                       • OpenSSH
Detailed Auditing of User Session
Activity for Windows, UNIX & Linux                                                • PuTTY
                                                                                  • Kerberized FTP and Telnet
                                                                                  • Samba
DirectSecure
Server Isolation and Protection
of Data-in-Motion
Solutions that Centrify Delivers
Compliance and Audit
 • Auditing and reporting (SOX, PCI,
                                                       Meet Strict Security & Audit Req’s
   FISMA, HIPAA, Basel II, etc.)

Security                                                Enforce system security policies
                                                    SOX /JSOX                        PCI DSS
                                                        Enforce ―least access‖
 • Risk mitigation & security of users
   with privileged access                               Lock down privileged accounts

Operational Efficiency                                  Enforce separation of duties
                                                              Microsoft Active Directory +

                                                        Associate privileges with individuals
                                                     FISMA
                                                                     Centrify
                                                                                 HIPAA
 • Leverage existing architecture
    • Leverage investments in Active Directory
                                                        Audit privileged user activities
      tools, skill sets and processes
                                                        Protect sensitive systems
    • Consolidate ―islands of identity‖

    • Deliver single sign-on for IT and end-users
                                                        Encrypt data-in-motion
                                                    Basel II.
                                                                                         ...?
                                                     FFIEC
 • Enable new computing models such
   as virtualization, cloud and mobile
Centrify Solutions Enforce Security Best Practices
                                                       Enforce system security policies
                                                       Enforce ―least access‖
 Sarbanes-Oxley                Federal
      Act
  Section 404
                             Information
                               Security
                                                       Associate privileges with individuals
                           Management Act

                                                       Lock down privileged accounts
                                                       Enforce separation of duties
Health Insurance            Basel II. FFIEC
 Portability and
Accountability Act
                             Information
                           Security Booklet
                                                       Audit privileged user activities
                                                       Protect sensitive systems
    National
   Industrial
                             Payment Card
                             Industry Data             Encrypt data-in-motion
Security Program           Security Standard
Operating Manual

  © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED.                                   SLIDE 35
Learn More and Evaluate Centrify Yourself
WEB SITE                  www.centrify.com
TECHNICAL VIDEOS & MORE   www.centrify.com/resources
SUPPORTED PLATFORMS       www.centrify.com/platforms
REQUEST AN EVAL           www.centrify.com/trial
FREE SOFTWARE             www.centrify.com/express
CONTACT US                www.centrify.com/contact
PHONE                     Worldwide:   +1 (408) 542-7500
                          Europe:      +44 (0) 1344 317950
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure Sentri
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in checkOracleIDM
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionBob Rhubart
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportionsOracleIDM
 
Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?WinWire Technologies Inc
 
Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Cana Ko
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalOracleIDM
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Cana Ko
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Novell
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 

Was ist angesagt? (20)

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented Abstraction
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?Is Silverlight Ready to Replace Flash in the Enterprise?
Is Silverlight Ready to Replace Flash in the Enterprise?
 
Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 

Andere mochten auch

Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...John M. Willis
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...ForgeRock
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Detect, Deter, and Remediate Cyber Risk
Detect, Deter, and Remediate Cyber Risk Detect, Deter, and Remediate Cyber Risk
Detect, Deter, and Remediate Cyber Risk Courion Corporation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 

Andere mochten auch (10)

Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Detect, Deter, and Remediate Cyber Risk
Detect, Deter, and Remediate Cyber Risk Detect, Deter, and Remediate Cyber Risk
Detect, Deter, and Remediate Cyber Risk
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 

Ähnlich wie DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga Nov2011

DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CloudIDSummit
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4ikirmer
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryNetwrix Corporation
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Atul Goyal
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at NetflixJason Chan
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewSpiffy
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active DirectoryPhil Ashman
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04BIWUG
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)Mary Leigh Mackie
 

Ähnlich wie DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga Nov2011 (20)

DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4Network Sage™ Into To C Level V1.4
Network Sage™ Into To C Level V1.4
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active Directory
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
 
Enterprise Security & SSO
Enterprise Security & SSOEnterprise Security & SSO
Enterprise Security & SSO
 

Mehr von Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Mehr von Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Kürzlich hochgeladen

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Kürzlich hochgeladen (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga Nov2011

  • 1. Centrify Centralizing the Control, Security and Audit of UNIX, Linux and Mac Systems Barry Scott Technical Director Centrify EMEA barry.scott@centrify.com +44 7770 430 007
  • 2. Agenda • Introduction • The Centrify Vision • Access Governance and Centralisation • Automated Security Enforcement • Protect Systems • Authorize Privilege • Audit Systems • Centrify Solutions © 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 2
  • 3. The Centrify Vision Control, Secure and Audit Access to Cross-Platform Systems and Applications Centrify the Enterprise Leverage infrastructure you already own – Active Directory – to: Control Secure Audit What users can access User access and privileges What the users did
  • 4. Identity Management Today Active Directory Windows PC’s and Servers Exchange Server Unix / Linux / Mac / Enterprise & Web Applications © 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 4
  • 5. Identity Management with Centrify Active Directory Windows PC’s and Servers Exchange Server Centralised Identity and Access Management with Centrify • ALL identity and privilege information stored, managed and audited in Active Directory • No Additional Identity Store or Server, therefore no synchronisation of identities • Leverage existing infrastructure and Best Practices in AD © 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 5
  • 6. Banking and Finance – We’ve done it before… • Very large and time-sensitive projects • Touching systems that contain critical and strategic information assets – the ―Crown Jewels‖ • All customers undertook a deep and comprehensive competitive and technical evaluation with Centrify winning on each occasion due to our technical superiority, ease of deployment and simplicity. • “During our technical evaluation and score-carding process involving 6 vendors, Centrify came top in 14 out of 15 technical score-card categories. The vendor ranked second was a considerable way behind Centrify both technically and from an ease of deployment perspective due to Centrify’s unique zoning capabilities” • “We were able to deploy and join to Active Directory up to 500 systems per night with Centrify once our architectural design was complete.” • “During our PoC, it was very evident that Centrify Suite is built on a common architecture and code base, whereas other solutions we tested were clearly a bunch of acquired technologies loosely glued together with the only integration points being marketing !” © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 6
  • 7. Recurring Regulatory Requirements and Audit Points • Common recurring Regulatory Requirements and Audit Points we are helping our customers address: • Sharing of generic *nix accounts with powerful (very often root) DirectControl privileges, by a number of individuals, resulting in a lack of accountability due to the use of shared passwords • Password aging is typically not enforced on many privileged and non- DirectControl privileged user accounts in a *nix environment • Password complexity checks are very rarely implemented on *nix DirectControl systems resulting in insecurities from a system access perspective • Activities undertaken by IT Staff as the ―root‖ user (as well as other DirectControl privileged users; DBA’s etc) are typically not logged or captured DirectAudit resulting in a lack of audit trail resulting in failed audits as they relate to regulatory and compliance requirements © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 7
  • 8. Recurring Regulatory Requirements and Audit Points • Common recurring Regulatory Requirements and Audit Points we are helping our customers address: • Privileged users will typically be assigned privileged accounts which DirectAuthorize very often lack any control over what commands or actions they are allowed to undertake on the *nix systems • The ability to undertake account recertification as well as a process DirectControl to enforce account recertification is typically not implemented but is DirectAuthorize a requirement for audit and regulatory compliance • Where a separate directory has already been implemented for the DirectControl management of identities in the *nix environment, synchronization of accounts and creation and deletion of accounts on *nix servers does not always complete successfully or in a timely manner, thus resulting in inconsistences in relation to system access. © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 8
  • 9. Access Governance Starts with Centralization Centralize Security, Identity and Access Management within Active Directory Identity Consolidation Privileged Access Management • De-duplicate identity infrastructure • Associate privileges with individuals • Get users to login as themselves / SSO • Enforce ―least access & least privileges‖ • Single security policy definition • Audit privileged user activities • Single point of administrative control • Isolate systems & encrypt data-in-motion dba SysAdmin root DBAs websa Users Groups Unix Profiles User Roles Security Policies Active Directory-based Security Infrastructure Protecting Systems. Authorizing Privileges. Auditing Activities. © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 9
  • 10. Centralized Management Presents Challenges Centralization Corresponding Challenges Goals • Legacy namespace is complex and different across many systems • Centralized UNIX Identities • Individual system differences make centralization difficult • Establishing a global namespace • Access rights are typically • Limited access granted where needed granted too broadly • Locked down privileged accounts • Granting privileges requires a simple way to create and • Privileges granted to individual users manage the policies • Audit privileged activities • Integration with existing management processes © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 10
  • 11. Infrastructure as a Service Brings More, New Challenges Adoption of IaaS is growing in the Enterprise • Yankee Group says 24% are using IaaS, 60% are planning to use in 12 months • Adoption trends are first in Development, then QA/Test, eventually to Production Security remains the primary issue blocking Enterprise use • Cloud Security Alliance identified 7 threats to cloud computing • Gartner identified privileged user access as the #1 cloud computing risk The Challenges to Enterprise-use inexpensive public IaaS are very familiar • Cloud server security is left to the customer • Cloud server templates have common privileged accounts and passwords • Cloud servers are typically deployed on public networks with dynamic IP addresses • Access controls and activity auditing are left to the customer • Applications hosted on these servers don’t enable end user single sign-on access © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 11
  • 12. The Solution is to Automate Security Enforcement By Leveraging Active Directory as the centralized security infrastructure Protect Systems • Group Policy enforces system security policies • IPsec based network protection policies Protect • AD management of privileged accounts Authorize Privileges • AD-based unique identity Audit • Role-based access and privilege • AD enforces separation of duties Audit Activities • Audit all user activity Authorize • Report on access rights and privileges Resulting in automated security for the Enterprise © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 12
  • 13. Leverage Active Directory to Automate Security Enforcement PROTECT SYSTEMS © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 13
  • 14. Active Directory-based Computer Identity Active Directory services provide the foundation for Enterprise security • Highly distributed, fault tolerant directory infrastructure designed for scalability • Supports large Enterprises through multi-Forest, multi-Domain configurations • Kerberos-based authentication and authorization infrastructure providing SSO Computer systems join Active Directory • Establishing individual computer accounts for each system • Automatically enrolling for PKI certificates and establishing Enterprise trust • Enabling authorized Active Directory Users to login, online & offline • Controlling user authentication for both interactive and network logins HR Field Ops © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 14
  • 15. Security Policies Auto-Enforced by Group Policy Consistent security and configuration policies need to be enforced on all Windows, UNIX, Linux and Mac systems • Group Policy is automatically enforced at system join to Active Directory • Group Policy defines standard baseline and periodically reapplies it • User Group Policy is enforced at user login Group Policies enforce: • System authentication configuration • System Banner settings • Screen Saver & Unlock policies • SSH policies control remote access security • Firewall policies control machine access • Mac OS X specific policies control the system and user’s environment © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 15
  • 16. Prevent Data Breaches from External Threats • IPsec Transport Mode isolates the entire enterprise, preventing access by rogue or untrusted computers and users — reducing the attack surface • Network-level access controls are much more important when: • Enterprise network boundaries become porous as they include wireless and grow exponentially • Users’ work becomes more virtual, accessing corporate resources from mobile / remote locations • Software- and policy-based approach lets you avoid an expensive VLAN and network router ACLs approach Trusted Corporate Network Rogue Computer Managed Managed Computers Computer © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 16
  • 17. Isolate Sensitive Servers & Protect Data-in-Motion IPsec authentication policies logically isolate sensitive servers independent of physical network location • Sensitive information systems are isolated based on PKI identities and AD group membership IPsec encryption protects data-in-motion without modifying older applications • Enforce peer-to-peer, network-layer encryption for applications that transport sensitive information AH ESP IP Header Protected Data ESP Trailer Header Header Encrypted Authenticated Encryption Each packet is encrypted preventing attackers from seeing any sensitive information © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 17
  • 18. Leverage Active Directory to Automate Security Enforcement AUTHORIZE PRIVILEGES © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 18
  • 19. Active Directory Centralizes Account Management • UNIX Account administration leverages centralized Active Directory processes and automation • Account and authentication policies are enforced on all systems Existing Identity Management Solutions Active Directory Users and Computers MMC Admin Console Provisioning APIs/Tools Unix Command Line Interface Active Directory-based Security Infrastructure © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 19
  • 20. Centralize The Most Complex UNIX Environments Zones uniquely simplifies the integration and centralized management of complex UNIX identity and access permissions into Active Directory • Only solution designed from the ground up to support migration of multiple UNIX environments and namespaces into a common Directory • Zones provides unique ability to manage UNIX identity, UNIX access rights and delegated administration Centrify supports native AD delegation for separation of duties • Zones create natural AD boundaries for delegated UNIX administration of a group of systems through AD access controls on UNIX Zone objects Seamlessly integrate administration into existing IDM systems • AD Group membership controls the provisioning of UNIX profiles granting access and privileges • IDM systems simply manage AD Group Membership in order to control the environment Engineering Finance HR Retail Active Directory-based Security Infrastructure © 2004-2011. CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 20
  • 21. Ensure Separation of Administrative Duties Separation of AD and Unix Admins • User’s Unix profile are stored independent of AD UNIX User object Administration Zone Administrator • Unix Admins don’t need rights to manage AD User objects, only Unix profiles HR Zone Separation of Unix Departmental Admins • Each Zone is delegated to the appropriate Unix Admin • Unix Admins only need rights to manage Unix profiles within their own Zone Fred Joan Active Directory AD & Windows Administration © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 21
  • 22. Least Access is Enforced Through Zones • System Access is denied unless explicitly granted • Access is granted to a Zone (a logical group of systems) • Users’ UNIX Profiles within a Zone are linked to the AD User Administration Zone Accounting Zone HR Zone Field Ops Zone fredt fthomas jlsmith joans joans UID = 10002 UID = 31590 UID = 61245 UID = 4226 UID = 200 Fred Joan AD Users, Computers & Groups Active Directory One Way Trust © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 22
  • 23. Active Directory-based User Login Smartcard login policies are also enforced • DirectControl for OS X supports CAC or PIV smartcard login to Active Directory granting Kerberos tickets for SSO to integrated services • Users configured for Smartcard interactive login only are not allowed to login with a password, however Kerberos login after smartcard is allowed Kerberos provides strong mutual authentication to Servers after desktop smartcard login © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 23
  • 24. Lock Down Privileged Accounts Lockdown privileged and service accounts within Active Directory • Online authentication requires AD-based password validation • Offline authentication uses the local cached account • Passwords are synchronized to local storage for single user mode login Leverage role-based privilege grants to root root eliminate risks exposed by these accounts • Eliminating need to access privileged accounts • Enables locking down these account passwords UNIX_root Active Directory © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 24
  • 25. Associate Privileges with Named Individuals Centralized role-based policy management • Create Roles based on job duties • Grant specific access and elevated privilege rights • Eliminate users’ need to use privileged accounts Roles Backup Operator Rights • Secure the system by granularly controlling how the Availability • Maintenance window only user accesses the system and what he can do Backup PAM Access Operator • ssh login Unix rights granted to Roles Privileged Commands • tar command as root • Availability – controls when a Role can be used Restricted Environment • Only specific commands • PAM Access – controls how users access UNIX system interfaces and applications • Privilege Commands – grants elevated privileges Resources HR Zone where needed • Restricted Shell - controls allowed commands in the user’s environment © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 25
  • 26. Grant Privileged Commands to Users via Roles • Web Admins are assigned root privileges for specific Apache management operations © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 26
  • 27. Role Assignments Ensure Accountability AD Users & Groups Role Assignment Fred Joan Backup • Active Directory Users are assigned to a Role, eliminating ambiguity, ensuring accountability • Active Directory Groups can be assigned to a Role, Roles simplifying management Backup Operator Rights Availability • User assignment can be date/time limited – enabling • Maintenance window only Backup temporary rights grants PAM Access Operator • ssh login Privileged Commands • tar command as root Assignment Scope Restricted Environment • Only specific commands • Roles apply to all computers within a Zone/Department • Users within a Role can be granted Rights to Resources HR Zone Computers serving a specific Role (DBA -> Oracle) • Assignment can be defined for a specific Computer © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 27
  • 28. Leverage Active Directory to Automate Security Enforcement AUDIT ACTIVITIES © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 28
  • 29. System Logs and Events Provide Visibility Show me accounts not used in last 90 days. • Syslog rollup brings in operational intelligence from Are there any systems where Centrify is not connected? other systems, apps, SIEM, security devices, etc. How long was a user in a role? Metrics and Alerts Active Local and AD User Accounts Data Config files Directory Authentication Attempts Centrify Zone and Role Assignments *NIX Syslog /etc/passwd Centrify Health and Configuration Dashboards and Reports I want to see all failed login attempts. • Shows changes in AD, *nix login attempts, Windows login Are there any newly created local accounts on my server? attempts, Centrify agent health, etc. Who zone-enabled this user? © 2004-2011. CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 29
  • 30. High Definition Visibility Provided by Session Recording • Establish User accountability • Tracks all user access to systems • Centrally search captured sessions © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 30
  • 31. Reporting Simplified with Centralized Management Authorization and Access Reports can be centrally created:  Reporting on user account properties  Detailing user role assignments and privilege command rights  Showing user access rights to computers Active Directory based reporting  Reports are generated on live, editable AD information  Administrators can take snapshots of a report © 2004-2011 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 31
  • 32. Centrify Solutions and the Challenges They Address
  • 33. Centrify Products… Delivered as the Centrify Suite EXPRESS STANDARD ENTERPRISE PLATINUM DirectManage Single Sign-On Centralized Management and For Applications Administration With all editions you can purchase SSO modules for: DirectControl • Apache & J2EE web apps Consolidate Identities and Centralize Authentication • SAP NetWeaver & GUI • DB2 DirectAuthorize Centrify-Enabled Role-based Authorization and Privilege Management Open Source Tools All editions also include free, Centrify-enabled versions of: DirectAudit • OpenSSH Detailed Auditing of User Session Activity for Windows, UNIX & Linux • PuTTY • Kerberized FTP and Telnet • Samba DirectSecure Server Isolation and Protection of Data-in-Motion
  • 34. Solutions that Centrify Delivers Compliance and Audit • Auditing and reporting (SOX, PCI, Meet Strict Security & Audit Req’s FISMA, HIPAA, Basel II, etc.) Security  Enforce system security policies SOX /JSOX PCI DSS  Enforce ―least access‖ • Risk mitigation & security of users with privileged access  Lock down privileged accounts Operational Efficiency  Enforce separation of duties Microsoft Active Directory +  Associate privileges with individuals FISMA Centrify HIPAA • Leverage existing architecture • Leverage investments in Active Directory  Audit privileged user activities tools, skill sets and processes  Protect sensitive systems • Consolidate ―islands of identity‖ • Deliver single sign-on for IT and end-users  Encrypt data-in-motion Basel II. ...? FFIEC • Enable new computing models such as virtualization, cloud and mobile
  • 35. Centrify Solutions Enforce Security Best Practices  Enforce system security policies  Enforce ―least access‖ Sarbanes-Oxley Federal Act Section 404 Information Security  Associate privileges with individuals Management Act  Lock down privileged accounts  Enforce separation of duties Health Insurance Basel II. FFIEC Portability and Accountability Act Information Security Booklet  Audit privileged user activities  Protect sensitive systems National Industrial Payment Card Industry Data  Encrypt data-in-motion Security Program Security Standard Operating Manual © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 35
  • 36. Learn More and Evaluate Centrify Yourself WEB SITE www.centrify.com TECHNICAL VIDEOS & MORE www.centrify.com/resources SUPPORTED PLATFORMS www.centrify.com/platforms REQUEST AN EVAL www.centrify.com/trial FREE SOFTWARE www.centrify.com/express CONTACT US www.centrify.com/contact PHONE Worldwide: +1 (408) 542-7500 Europe: +44 (0) 1344 317950