SlideShare ist ein Scribd-Unternehmen logo
1 von 27
1 © 2013 IBM Corporation
IBM Security Systems
Chris Poulin
IBM Security Systems
July, 2014
5 Reasons your IAM Solution Will Fail
© 2014 IBM Corporation
IBM Security Systems
2
In this era of Mobile, Cloud, & Social, security is a major concern
IBM Confidential
Mobile
Cloud
Social
50%
of the employers will require BYOD
for work by 2017
55%
of CIOs to source all their critical
applications in Cloud by 2020
54%
of CIOs cited Social Media as one
of the most disruptive technologies
90%
of the top mobile apps have been
hacked
72%
of organizations saw unauthorized
access to cloud in past 12 months
75%
of enterprises cited social media as
the top information security risk
Source: 1. Gartner – May 2013
© 2014 IBM Corporation
IBM Security Systems
3
more than
half a billion records
of personally identifiable information (PII) were leaked in 2013
© 2013 IBM Corporation
IBM Security Systems
4
Enterprise Security is only as strong as its weakest link – Identity
of scam and phishing incidents
are campaigns enticing users
to click on malicious links
55%
Criminals are
selling stolen or
fabricated accounts
Social media is fertile
ground for pre-attack
intelligence gathering
Source: IBM X-Force® Research 2013 Trend and Risk Report
Mobile and Cloud breaking
down the traditional
perimeter
IAM becomes fist line of
defense with Threat and
Context awareness
© 2014 IBM Corporation
IBM Security Systems
5
Reason #1: Human Factors—User Behavior
Users will try to get around strict policies
 Invest minimum effort in creating passwords
 Lack of strength and variety
 Across multiple authentication domains
 Not enable out-of-band / multi-factor auth
 Use 3rd party cloud services
over enterprise provided ones
 Store passwords in Evernote
….plus strong passwords can sometimes jeopardize safety
© 2014 IBM Corporation
IBM Security Systems
6
Reason #2: Identity Sprawl
Multiple internal authentication sources
 Microsoft Active Directory
 Legacy systems and directories
 Custom applications
…and external directories
 Cloud services
 Social media networks
Directories, Databases, Files,
SAP, Web Services, Applications
© 2014 IBM Corporation
IBM Security Systems
7
Reason #3: Losing Control
Device ownership model is changing
 Mobile devices (smart phones & tablets)
 BYOD, including employee-owned laptops
 Not all devices have the concept of identity:
the holder is the owner
© 2014 IBM Corporation
IBM Security Systems
8
Reason #4: Rogue Privileged Insiders
Those with administrative privileges
can abuse that trust for
 Profit
 Revenge
 Convenience
“$348B a year in corporate losses can be tied directly to privileged user fraud.”
– Raytheon, “Privileged Users” whitepaper, 2014
© 2014 IBM Corporation
IBM Security Systems
9
Reason #5: Lack of Visibility—If You Can’t See It...
...is it really a threat?
 What are your users up to?
 How do you know?
 How do you prove it?
When you turn on the lights
the cockroaches skitter
under the fridge
=> Visibility, monitoring, auditing
© 2014 IBM Corporation
IBM Security Systems
10
Avoiding the 5 pitfalls of identity and access management
UserBehavior
IdentitySprawl
Control/BYOD
PrivilegedID
Visibility
Single Sign-on
Context-based authentication
Risk-based transaction context
Directory integration
Federated identity (inc SCIM)
One-time registration
Device fingerprinting
Eliminate shared passwords
Audit super users
Record sessions
Security intelligence
Follow user activity
Detect & report anomalous behavior
How to enable security through IAM
11
simplify their experience through context-
based authentication
connect your directory stores, in-house, in the
cloud, on the web
trust the device, trust the application, trust the
transaction
Inventory, control, and track administrative
users & credentials
User behavior
Identity sprawl
Mobile & BYOD
Privileged Users
Lack of visibility Security Intelligence
© 2014 IBM Corporation
IBM Security Systems
12
 Single Sign-On to web based
applications on mobile devices
Single sign-on & elimination of password entry using ESSO
Results: Users don’t need to
remember multiple passwords,
improving access security
© 2013 IBM Corporation
IBM Security Systems
13
SSO
Enterprise
Applications/Data
User accesses data from inside
the corporate network1
User is only asked for User Id and
Password to authenticate2
Corporate Network
User accesses confidential data from
outside the corporate network3
User is asked for User Id /Password and
OTP based on risk score4
Outside the Corporate Network
Audit
Log
Strong
Authentication
 Security gateway for user access based on risk-level (e.g. permit, deny, step-up authenticate)
 Risk scoring using user attributes and real-time context (e.g. device registration, geolocation, IP reputation, etc)
 Supports built-in One-Time Password (OTP) and ability to integrate with 3rd party strong authentication vendors
 Software Development Kit (SDK) for 3rd integration and extensibility
Context-based authentication & access, based on risk
IBM Security
Access Manager
© 2013 IBM Corporation
IBM Security Systems
14
Access Operations Grant/Deny
An authorized user requests access to the portal and SSO Grant
Password is stolen, session is hijacked and HTTP content is compromised Deny
HTTP content contains common vulnerabilities such as SQL Injection, Cross site scripting,
Cross-site request forgery
Deny
IP Address has a low IP Reputation score and Geo Location allowed Deny
Enforce step-up authentication or context-based access to restore authorized user access Grant
Portal, Web Applications
(e.g. Java, .NET, more)
B2B Partners,
Citizens, Mobile
users
Supply Chain
Secure access and protect content against targeted attacks
IBM Security Access Manager
© 2013 IBM Corporation
IBM Security Systems
15
Identity-aware application access on mobile devices
Before
Name/Password for
every app launch
One-time registration
code
Identity-aware
application launch
After
Application Server IBM Security
Access Manager
 Eliminate user id and
password based login on
mobile apps
 Assurance through one
time registration code to
link device with application
and user identity
 Identity and Device
“Fingerprinting” - silent
and consent based device
registration
 Self-service user interface
for device registration and
access revocation
© 2013 IBM Corporation
IBM Security Systems
16
Risk-based access and stronger authentication for transactions
User attempts high-
value transaction
Strong authentication
challenge Transaction completes
Reduce risk associated with mobile user and service transactions
Example: transactions less than $100 are allowed with no additional authentication
User attempts transfer of amount greater than $100 – requires an OTP for strong authentication
© 2013 IBM Corporation
IBM Security Systems
17
Migrate or co-exist
Join multiple
directories
Enrich with
data from
other sources
Federate authentication
back to original source
Selective
“writes” of
changes to the
original source
 Create a single source of truth for identity information using
Federated Directory Services
SCIM REST interface for
LDAP server
“Untangle” identity silos with directory integration and federation
© 2013 IBM Corporation
IBM Security Systems
18
 Privileged User Activity Monitoring:
• Recording and logging of user activity in sessions accessed through a shared ID
• Discourage users with privilege from abusing their rights
Find, control, and track privileged & shared identity activity
© 2013 IBM Corporation
IBM Security Systems
19
Full visibility and accountability with closed-loop IAM analytics
IAM Analytics &
Security Intelligence
Accounts
Updated
Access
Certification
Access
Policy
Identity
Change
Detect and Correct Local Privilege Settings
HR Systems/Identity Stores
DataApplications
On/Off-premise
Resources
Cloud Mobile
Identity Management
Real-time insider fraud detection with
integrated IAM Analytics and Security Intelligence
Risk Based
Access
© 2013 IBM Corporation
IBM Security Systems
20
Detect threats, monitor user activity and detect anomalies
• Identity and Access Manager event logs offers rich
insights into actual users and their roles
• IAM integration with QRadar SIEM provides
detection of break-ins tied to actual users & roles
IBM Security Systems
© 2013 IBM Corporation21 IBM Security Systems
Manage Enterprise Identity Context Across All Security Domains
Compete Threat-aware Identity and Access Management
© 2014 IBM Corporation
IBM Security Systems
22
Identity is a key security control for a multi-perimeter world
• Operational management
• Compliance driven
• Static, Trust-based
• Security risk management
• Business driven
• Dynamic, context-based
Today: Administration
Tomorrow: Assurance
IAM is centralized and internal
Enterprise
IAM
Cloud IAM
BYO-IDs
SaaS
Device-IDs
App IDs
IAM is decentralized and external
Enterprise
IAM
IaaS,
PaaS
© 2014 IBM Corporation
IBM Security Systems
23
Optimized
Security Intelligence:
User activity monitoring, Anomaly detection, Identity Analytics & Reporting
IAM Integration
with GRC
Fine-grained
entitlements
Integrated Web &
Mobile Access
Gateway
Risk / Context based
Access
Governance of
SaaS applications
IAM as a SaaS
IAM integration with
GRC
Risk/ Context-based
IAM Governance
Risk / Context-
based Privileged
Identity Mgmt
Proficient
Closed-loop
Identity & Access
Mgmt
Strong
Authentication
Strong Authentication
(e.g. device based)
Web Application
Protection
Bring your own ID
Integrated IAM for
IaaS, PaaS & SaaS
(Enterprise)
Closed-loop Identity
and Access Mgmt
Access Certification &
fulfillment (Enterprise)
Closed-loop
Privileged Identity
Mgmt
Basic
Request based
Identity Mgmt
Web Access
Management
Federated SSO
Mobile User Access
Management
Federated access
to SaaS (LoB)
User Provisioning
for Cloud/SaaS
Access Certification
(LoB)
Request based Identity
Mgmt.
Shared Access and
Password
Management
Compliance Mobile Security Cloud Security IAM Governance Privileged IdM
Organizations use a maturity model for IAM to support security
© 2014 IBM Corporation
IBM Security Systems
24
Landscape of Identity & Access Management market is evolving
By 2020,
70%
of enterprises will use
attribute-based access control
as the dominant mechanism to protect critical
assets ...
... and
80%
of user access will be shaped by
new mobile and non-PC
architectures that service all
identity types regardless of origin.1
With the growing adoption of
mobile, adaptive
authentication &
fine-grained authorization,
traditional
Web Access Management
is being replaced by a broader
“access management.”1
A clear need exists in the
market for a
converged solution2
that is able to provide or
integrate with
MDM, authentication,
federation, and fraud
detection solutions.3
1 Gartner, Predicts 2014: Identity and Access Management, November 26, 2013
2 Gartner, MarketScope for Web Access Management, November 15, 2013
3 Forrester, Predictions 2014: Identity and Access Management, January 7, 2014
© 2013 IBM Corporation
IBM Security Systems
25
Deliver
actionable identity
intelligence
Safeguard
mobile, cloud and social
access
Simplify
cloud integrations and
identity silos
Prevent
advanced
insider threats
• Validate “who is who”
especially when users connect
from outside the enterprise
• Proactively enforce access
policies on web, social and
mobile collaboration channels
• Manage and audit privileged
access across the enterprise
• Defend applications and data
against unauthorized access
• Provide federated access to
enable secure online business
collaboration
• Unify “Universe of Identities”
for efficient directory management
• Streamline identity management across
all security domains
• Manage and monitor user entitlements
and activities with security intelligence
Threat-aware Identity and Access Management becomes the
first line of defense for securing multi perimeter world
© 2014 IBM Corporation
IBM Security Systems
26
Connect with IBM Security
IBM Security Insights blog at www.SecurityIntelligence.com
www.ibm.com/Identity-
Access-Management
Follow us at @ibmsecurity
© 2013 IBM Corporation
IBM Security Systems
IBM Security Systems
www.ibm.com/security
© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only,
and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of
IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which
IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on
market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM
logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to
improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or
can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and
no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part
of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or
services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR
ILLEGAL CONDUCT OF ANY PARTY.
www.ibm.com/security
© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only,
and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of
IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which
IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on
market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM
logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to
improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or
can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and
no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part
of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or
services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR
ILLEGAL CONDUCT OF ANY PARTY.

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 

Was ist angesagt? (20)

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 

Ähnlich wie 5 reasons your iam solution will fail

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is NowLane Billings
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 

Ähnlich wie 5 reasons your iam solution will fail (20)

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Mehr von IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Mehr von IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Kürzlich hochgeladen

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Kürzlich hochgeladen (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

5 reasons your iam solution will fail

  • 1. 1 © 2013 IBM Corporation IBM Security Systems Chris Poulin IBM Security Systems July, 2014 5 Reasons your IAM Solution Will Fail
  • 2. © 2014 IBM Corporation IBM Security Systems 2 In this era of Mobile, Cloud, & Social, security is a major concern IBM Confidential Mobile Cloud Social 50% of the employers will require BYOD for work by 2017 55% of CIOs to source all their critical applications in Cloud by 2020 54% of CIOs cited Social Media as one of the most disruptive technologies 90% of the top mobile apps have been hacked 72% of organizations saw unauthorized access to cloud in past 12 months 75% of enterprises cited social media as the top information security risk Source: 1. Gartner – May 2013
  • 3. © 2014 IBM Corporation IBM Security Systems 3 more than half a billion records of personally identifiable information (PII) were leaked in 2013
  • 4. © 2013 IBM Corporation IBM Security Systems 4 Enterprise Security is only as strong as its weakest link – Identity of scam and phishing incidents are campaigns enticing users to click on malicious links 55% Criminals are selling stolen or fabricated accounts Social media is fertile ground for pre-attack intelligence gathering Source: IBM X-Force® Research 2013 Trend and Risk Report Mobile and Cloud breaking down the traditional perimeter IAM becomes fist line of defense with Threat and Context awareness
  • 5. © 2014 IBM Corporation IBM Security Systems 5 Reason #1: Human Factors—User Behavior Users will try to get around strict policies  Invest minimum effort in creating passwords  Lack of strength and variety  Across multiple authentication domains  Not enable out-of-band / multi-factor auth  Use 3rd party cloud services over enterprise provided ones  Store passwords in Evernote ….plus strong passwords can sometimes jeopardize safety
  • 6. © 2014 IBM Corporation IBM Security Systems 6 Reason #2: Identity Sprawl Multiple internal authentication sources  Microsoft Active Directory  Legacy systems and directories  Custom applications …and external directories  Cloud services  Social media networks Directories, Databases, Files, SAP, Web Services, Applications
  • 7. © 2014 IBM Corporation IBM Security Systems 7 Reason #3: Losing Control Device ownership model is changing  Mobile devices (smart phones & tablets)  BYOD, including employee-owned laptops  Not all devices have the concept of identity: the holder is the owner
  • 8. © 2014 IBM Corporation IBM Security Systems 8 Reason #4: Rogue Privileged Insiders Those with administrative privileges can abuse that trust for  Profit  Revenge  Convenience “$348B a year in corporate losses can be tied directly to privileged user fraud.” – Raytheon, “Privileged Users” whitepaper, 2014
  • 9. © 2014 IBM Corporation IBM Security Systems 9 Reason #5: Lack of Visibility—If You Can’t See It... ...is it really a threat?  What are your users up to?  How do you know?  How do you prove it? When you turn on the lights the cockroaches skitter under the fridge => Visibility, monitoring, auditing
  • 10. © 2014 IBM Corporation IBM Security Systems 10 Avoiding the 5 pitfalls of identity and access management UserBehavior IdentitySprawl Control/BYOD PrivilegedID Visibility Single Sign-on Context-based authentication Risk-based transaction context Directory integration Federated identity (inc SCIM) One-time registration Device fingerprinting Eliminate shared passwords Audit super users Record sessions Security intelligence Follow user activity Detect & report anomalous behavior
  • 11. How to enable security through IAM 11 simplify their experience through context- based authentication connect your directory stores, in-house, in the cloud, on the web trust the device, trust the application, trust the transaction Inventory, control, and track administrative users & credentials User behavior Identity sprawl Mobile & BYOD Privileged Users Lack of visibility Security Intelligence
  • 12. © 2014 IBM Corporation IBM Security Systems 12  Single Sign-On to web based applications on mobile devices Single sign-on & elimination of password entry using ESSO Results: Users don’t need to remember multiple passwords, improving access security
  • 13. © 2013 IBM Corporation IBM Security Systems 13 SSO Enterprise Applications/Data User accesses data from inside the corporate network1 User is only asked for User Id and Password to authenticate2 Corporate Network User accesses confidential data from outside the corporate network3 User is asked for User Id /Password and OTP based on risk score4 Outside the Corporate Network Audit Log Strong Authentication  Security gateway for user access based on risk-level (e.g. permit, deny, step-up authenticate)  Risk scoring using user attributes and real-time context (e.g. device registration, geolocation, IP reputation, etc)  Supports built-in One-Time Password (OTP) and ability to integrate with 3rd party strong authentication vendors  Software Development Kit (SDK) for 3rd integration and extensibility Context-based authentication & access, based on risk IBM Security Access Manager
  • 14. © 2013 IBM Corporation IBM Security Systems 14 Access Operations Grant/Deny An authorized user requests access to the portal and SSO Grant Password is stolen, session is hijacked and HTTP content is compromised Deny HTTP content contains common vulnerabilities such as SQL Injection, Cross site scripting, Cross-site request forgery Deny IP Address has a low IP Reputation score and Geo Location allowed Deny Enforce step-up authentication or context-based access to restore authorized user access Grant Portal, Web Applications (e.g. Java, .NET, more) B2B Partners, Citizens, Mobile users Supply Chain Secure access and protect content against targeted attacks IBM Security Access Manager
  • 15. © 2013 IBM Corporation IBM Security Systems 15 Identity-aware application access on mobile devices Before Name/Password for every app launch One-time registration code Identity-aware application launch After Application Server IBM Security Access Manager  Eliminate user id and password based login on mobile apps  Assurance through one time registration code to link device with application and user identity  Identity and Device “Fingerprinting” - silent and consent based device registration  Self-service user interface for device registration and access revocation
  • 16. © 2013 IBM Corporation IBM Security Systems 16 Risk-based access and stronger authentication for transactions User attempts high- value transaction Strong authentication challenge Transaction completes Reduce risk associated with mobile user and service transactions Example: transactions less than $100 are allowed with no additional authentication User attempts transfer of amount greater than $100 – requires an OTP for strong authentication
  • 17. © 2013 IBM Corporation IBM Security Systems 17 Migrate or co-exist Join multiple directories Enrich with data from other sources Federate authentication back to original source Selective “writes” of changes to the original source  Create a single source of truth for identity information using Federated Directory Services SCIM REST interface for LDAP server “Untangle” identity silos with directory integration and federation
  • 18. © 2013 IBM Corporation IBM Security Systems 18  Privileged User Activity Monitoring: • Recording and logging of user activity in sessions accessed through a shared ID • Discourage users with privilege from abusing their rights Find, control, and track privileged & shared identity activity
  • 19. © 2013 IBM Corporation IBM Security Systems 19 Full visibility and accountability with closed-loop IAM analytics IAM Analytics & Security Intelligence Accounts Updated Access Certification Access Policy Identity Change Detect and Correct Local Privilege Settings HR Systems/Identity Stores DataApplications On/Off-premise Resources Cloud Mobile Identity Management Real-time insider fraud detection with integrated IAM Analytics and Security Intelligence Risk Based Access
  • 20. © 2013 IBM Corporation IBM Security Systems 20 Detect threats, monitor user activity and detect anomalies • Identity and Access Manager event logs offers rich insights into actual users and their roles • IAM integration with QRadar SIEM provides detection of break-ins tied to actual users & roles
  • 21. IBM Security Systems © 2013 IBM Corporation21 IBM Security Systems Manage Enterprise Identity Context Across All Security Domains Compete Threat-aware Identity and Access Management
  • 22. © 2014 IBM Corporation IBM Security Systems 22 Identity is a key security control for a multi-perimeter world • Operational management • Compliance driven • Static, Trust-based • Security risk management • Business driven • Dynamic, context-based Today: Administration Tomorrow: Assurance IAM is centralized and internal Enterprise IAM Cloud IAM BYO-IDs SaaS Device-IDs App IDs IAM is decentralized and external Enterprise IAM IaaS, PaaS
  • 23. © 2014 IBM Corporation IBM Security Systems 23 Optimized Security Intelligence: User activity monitoring, Anomaly detection, Identity Analytics & Reporting IAM Integration with GRC Fine-grained entitlements Integrated Web & Mobile Access Gateway Risk / Context based Access Governance of SaaS applications IAM as a SaaS IAM integration with GRC Risk/ Context-based IAM Governance Risk / Context- based Privileged Identity Mgmt Proficient Closed-loop Identity & Access Mgmt Strong Authentication Strong Authentication (e.g. device based) Web Application Protection Bring your own ID Integrated IAM for IaaS, PaaS & SaaS (Enterprise) Closed-loop Identity and Access Mgmt Access Certification & fulfillment (Enterprise) Closed-loop Privileged Identity Mgmt Basic Request based Identity Mgmt Web Access Management Federated SSO Mobile User Access Management Federated access to SaaS (LoB) User Provisioning for Cloud/SaaS Access Certification (LoB) Request based Identity Mgmt. Shared Access and Password Management Compliance Mobile Security Cloud Security IAM Governance Privileged IdM Organizations use a maturity model for IAM to support security
  • 24. © 2014 IBM Corporation IBM Security Systems 24 Landscape of Identity & Access Management market is evolving By 2020, 70% of enterprises will use attribute-based access control as the dominant mechanism to protect critical assets ... ... and 80% of user access will be shaped by new mobile and non-PC architectures that service all identity types regardless of origin.1 With the growing adoption of mobile, adaptive authentication & fine-grained authorization, traditional Web Access Management is being replaced by a broader “access management.”1 A clear need exists in the market for a converged solution2 that is able to provide or integrate with MDM, authentication, federation, and fraud detection solutions.3 1 Gartner, Predicts 2014: Identity and Access Management, November 26, 2013 2 Gartner, MarketScope for Web Access Management, November 15, 2013 3 Forrester, Predictions 2014: Identity and Access Management, January 7, 2014
  • 25. © 2013 IBM Corporation IBM Security Systems 25 Deliver actionable identity intelligence Safeguard mobile, cloud and social access Simplify cloud integrations and identity silos Prevent advanced insider threats • Validate “who is who” especially when users connect from outside the enterprise • Proactively enforce access policies on web, social and mobile collaboration channels • Manage and audit privileged access across the enterprise • Defend applications and data against unauthorized access • Provide federated access to enable secure online business collaboration • Unify “Universe of Identities” for efficient directory management • Streamline identity management across all security domains • Manage and monitor user entitlements and activities with security intelligence Threat-aware Identity and Access Management becomes the first line of defense for securing multi perimeter world
  • 26. © 2014 IBM Corporation IBM Security Systems 26 Connect with IBM Security IBM Security Insights blog at www.SecurityIntelligence.com www.ibm.com/Identity- Access-Management Follow us at @ibmsecurity
  • 27. © 2013 IBM Corporation IBM Security Systems IBM Security Systems www.ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.