SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Identity and Access Intelligence (IAI)  As a On-Demand Service Achieve Compliance by Discovering User Access Vulnerabilities and Abuse…from Data You Already Have VERIPHYR PROPRIETARY AND CONFIDENTIAL
Identity and Access Intelligence (IAI)  Gartner definition: Converting identity, rights, and activity data into knowledge for decision making by IT and business.  Or Rights/Roles  + User Activity = Business Intelligence $11.9 B for Identity & Access Management (IAM) by 2013 	– Gartner 50% of companies will shift IAM efforts to IAI by 2014	– Gartner VERIPHYR PROPRIETARY AND CONFIDENTIAL 2 February 19, 2011
VERIPHYR PROPRIETARY AND CONFIDENTIAL 3 February 19, 2011 IAI is a “Must Have” for Access Compliance Regulatory Goal: Rights & Activity = Job Function
$680K fine for violation of HIPAA regulations on user access to ePHI(1/11) $11 million insider fraud bymanager misusing user access of her former staff (09) Jail and fine for hospital worker due to inappropriateaccess of ePHI(3/10) Proprietary data stolen by terminatedemployees viaunrevoked accounts (9/10) $6 billion in trading lossesby stock trader with excessive access from previous job (08) $650K fine for weak user access control for ePHI at 5 California hospitals (6/10) Reality: Rights & Activity ≠ Job Function #1 IT Audit Finding Excessive access rights #1 Insider Threat  ,[object Object],More Vulnerabilities and Abuse ,[object Object]
Terminated Users
Orphan/Ghost Accounts
Dormant AccountsVERIPHYR PROPRIETARY AND CONFIDENTIAL 4 February 19, 2011
Rights/Roles User CanAccess Veriphyr Technology“People AreWhat They Do” (Vs. What MgmtThinks They Do) What User Should and Should NotAccess Activity User DoesAccess Discover Inappropriate User Access ,[object Object]
Actual - AbusesVERIPHYR PROPRIETARY 5 February 19, 2011
VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 6 February 19, 2011
VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 7 February 19, 2011
VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 8 February 19, 2011
9 Correlate across silos Apply analytics  Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
10 Correlate across silos Apply analytics  Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionForgeRock
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWSkarthisoft
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote ForgeRock
 
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...ForgeRock
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterForgeRock
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraForgeRock
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTkantarainitiative
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
Securing The Workplace Presentation From American Barcode And Rfid
Securing The Workplace Presentation From American Barcode And RfidSecuring The Workplace Presentation From American Barcode And Rfid
Securing The Workplace Presentation From American Barcode And RfidAmerican Barcode and RFID
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 

Was ist angesagt? (15)

Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community Revolution
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWS
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote
 
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, Forrester
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoT
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Securing The Workplace Presentation From American Barcode And Rfid
Securing The Workplace Presentation From American Barcode And RfidSecuring The Workplace Presentation From American Barcode And Rfid
Securing The Workplace Presentation From American Barcode And Rfid
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 

Andere mochten auch

Dummy omc30092
Dummy omc30092Dummy omc30092
Dummy omc30092omc30092
 
新团队 网站模块-项目预览-挑战150
新团队 网站模块-项目预览-挑战150新团队 网站模块-项目预览-挑战150
新团队 网站模块-项目预览-挑战150gaowenju476
 
Blogger termsofservice
Blogger termsofserviceBlogger termsofservice
Blogger termsofserviceomc30092
 
Coveo Search - Product Overview
Coveo Search - Product OverviewCoveo Search - Product Overview
Coveo Search - Product OverviewAmplexor
 
MyIBBT - Project Collaboration with Alfresco Share
MyIBBT - Project Collaboration with Alfresco ShareMyIBBT - Project Collaboration with Alfresco Share
MyIBBT - Project Collaboration with Alfresco ShareAmplexor
 
Introduction to Drupal Distributions
Introduction to Drupal DistributionsIntroduction to Drupal Distributions
Introduction to Drupal DistributionsAmplexor
 
Activiti - the Open Source Business Process Management platform by Alfresco
Activiti - the Open Source Business Process Management platform by AlfrescoActiviti - the Open Source Business Process Management platform by Alfresco
Activiti - the Open Source Business Process Management platform by AlfrescoAmplexor
 
客户答谢活动建议书
客户答谢活动建议书客户答谢活动建议书
客户答谢活动建议书gaowenju476
 
天大MBA新生拓展训练方案
天大MBA新生拓展训练方案天大MBA新生拓展训练方案
天大MBA新生拓展训练方案gaowenju476
 
员工素质拓展
员工素质拓展员工素质拓展
员工素质拓展gaowenju476
 
非常任务 预览
非常任务 预览非常任务 预览
非常任务 预览gaowenju476
 
兴润佳源团队提升方案
兴润佳源团队提升方案 兴润佳源团队提升方案
兴润佳源团队提升方案 gaowenju476
 
非常任务设计
非常任务设计非常任务设计
非常任务设计gaowenju476
 

Andere mochten auch (15)

Dummy omc30092
Dummy omc30092Dummy omc30092
Dummy omc30092
 
新团队 网站模块-项目预览-挑战150
新团队 网站模块-项目预览-挑战150新团队 网站模块-项目预览-挑战150
新团队 网站模块-项目预览-挑战150
 
Blogger termsofservice
Blogger termsofserviceBlogger termsofservice
Blogger termsofservice
 
Coveo Search - Product Overview
Coveo Search - Product OverviewCoveo Search - Product Overview
Coveo Search - Product Overview
 
MyIBBT - Project Collaboration with Alfresco Share
MyIBBT - Project Collaboration with Alfresco ShareMyIBBT - Project Collaboration with Alfresco Share
MyIBBT - Project Collaboration with Alfresco Share
 
Introduction to Drupal Distributions
Introduction to Drupal DistributionsIntroduction to Drupal Distributions
Introduction to Drupal Distributions
 
Activiti - the Open Source Business Process Management platform by Alfresco
Activiti - the Open Source Business Process Management platform by AlfrescoActiviti - the Open Source Business Process Management platform by Alfresco
Activiti - the Open Source Business Process Management platform by Alfresco
 
客户答谢活动建议书
客户答谢活动建议书客户答谢活动建议书
客户答谢活动建议书
 
天大MBA新生拓展训练方案
天大MBA新生拓展训练方案天大MBA新生拓展训练方案
天大MBA新生拓展训练方案
 
员工素质拓展
员工素质拓展员工素质拓展
员工素质拓展
 
非常任务 预览
非常任务 预览非常任务 预览
非常任务 预览
 
兴润佳源团队提升方案
兴润佳源团队提升方案 兴润佳源团队提升方案
兴润佳源团队提升方案
 
事业理念
事业理念事业理念
事业理念
 
产品服务
产品服务产品服务
产品服务
 
非常任务设计
非常任务设计非常任务设计
非常任务设计
 

Ähnlich wie Veriphyr slide share_20110219

Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsImperva
 
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral AnalyticsAPIsecure_ Official
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...apidays
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API AuthorizationNordic APIs
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
Security in FHIR with OAuth by Grahame Grieve
Security in FHIR with OAuth by Grahame GrieveSecurity in FHIR with OAuth by Grahame Grieve
Security in FHIR with OAuth by Grahame GrieveFHIR Developer Days
 
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseDenodo
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Business Development Institute
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperCasey Lucas
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesEnterprise Security Risk Management
 

Ähnlich wie Veriphyr slide share_20110219 (20)

Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API Authorization
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Security in FHIR with OAuth by Grahame Grieve
Security in FHIR with OAuth by Grahame GrieveSecurity in FHIR with OAuth by Grahame Grieve
Security in FHIR with OAuth by Grahame Grieve
 
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven Enterprise
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security Whitepaper
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sources
 

Kürzlich hochgeladen

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Veriphyr slide share_20110219

  • 1. Identity and Access Intelligence (IAI) As a On-Demand Service Achieve Compliance by Discovering User Access Vulnerabilities and Abuse…from Data You Already Have VERIPHYR PROPRIETARY AND CONFIDENTIAL
  • 2. Identity and Access Intelligence (IAI) Gartner definition: Converting identity, rights, and activity data into knowledge for decision making by IT and business. Or Rights/Roles + User Activity = Business Intelligence $11.9 B for Identity & Access Management (IAM) by 2013 – Gartner 50% of companies will shift IAM efforts to IAI by 2014 – Gartner VERIPHYR PROPRIETARY AND CONFIDENTIAL 2 February 19, 2011
  • 3. VERIPHYR PROPRIETARY AND CONFIDENTIAL 3 February 19, 2011 IAI is a “Must Have” for Access Compliance Regulatory Goal: Rights & Activity = Job Function
  • 4.
  • 7. Dormant AccountsVERIPHYR PROPRIETARY AND CONFIDENTIAL 4 February 19, 2011
  • 8.
  • 9. Actual - AbusesVERIPHYR PROPRIETARY 5 February 19, 2011
  • 10. VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 6 February 19, 2011
  • 11. VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 7 February 19, 2011
  • 12. VERIPHYR PROPRIETARY Identity, Rights, Activity,in Any Raw Native Format(encrypted connection) Customer Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data) Overcoming Barriers to AdoptionVeriphyr Service Does All the Work Cleanse,Collate, Correlate, Aggregate, and Analyze 8 February 19, 2011
  • 13. 9 Correlate across silos Apply analytics Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
  • 14. 10 Correlate across silos Apply analytics Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
  • 15. 11 Correlate across silos Apply analytics Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
  • 16. 12 Correlate across silos Apply analytics Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
  • 17. 13 Correlate across silos Apply analytics Deliver intelligenceinto the right hands Monitor status Report success Closed Loop Process VERIPHYR PROPRIETARY AND CONFIDENTIAL February 19, 2011
  • 18. Identity and Access Intelligence (IAI) As a Cloud Service For more information contact me Alan Norquist Founder and CEO anorquist@veriphyr.com www.Veriphyr.com VERIPHYR PROPRIETARY AND CONFIDENTIAL