SlideShare a Scribd company logo
1 of 17
Download to read offline
CA Technologies + Deloitte:
Growing and Protecting the Business
with Identity and Access
Management
Table of Contents
The Opposing Forces of Growing and Protecting the Business..............................................3
Identity as the New Security Perimeter........................................................................................4
The Need for a More Holistic, Centralized IAM Approach........................................................5
	 Identity and Access Management Framework............................................................................6
	 Identity Management and Governance........................................................................................7
	 Privileged Identity Management....................................................................................................8
	 Advanced Authentication...............................................................................................................10
	 Mobile and Cloud Security.............................................................................................................11
The Business Benefits of IAM........................................................................................................ 13
Leading Organizations Achieve Positive IAM Results with CA Technologies
and Deloitte...............................................................................................................................................14
	 Case Study: A Large, Vertically Integrated Marketer of Tires for the
	 U.S. Automotive Replacement Market........................................................................................14
	 Case Study: The Revenue Agency of a Canadian Provincial Government........................15
About the Deloitte/CA Technologies Alliance........................................................................... 16
02
03
The Opposing Forces of Growing and
Protecting the Business
A number of technology trends, including cloud, mobility, social
media and the consumerization of IT, have transformed not only
IT, but also the way employees, partners and customers interact
with an organization. And as software as a service (SaaS) and
cloud applications have grown in popularity, IT environments have
become more distributed, fragmented and nebulous – with many
components existing outside of the traditional security perimeter
of firewalls and virtual private networks (VPNs).
As a result, protecting today’s cloud-based, mobile enterprise
requires a new approach – one that focuses on secure identity and
access management (IAM), while at the same time driving two
critical imperatives:
Enable business growth by:
•	 Quickly deploying new online services
•	 Leveraging new advances in cloud computing and virtualization
•	 Accommodating the needs of demanding, tech-savvy users
(i.e., customers, partners, employees, etc.)
•	 Driving greater employee productivity and increasing
business intelligence
Protect the business by:
•	 Mitigating the risk of fraud, breaches, insider threats and
improper access – from both internal and external sources
•	 Safeguarding critical systems, applications and data
“While the shift to strengthening technical security controls is not surprising given the hype around cyber-attacks and data
security breaches, strong risk-based disciplines, such as enterprise risk management or risk-based information security, are rooted
in proactive, data-driven decision making,” said John A. Wheeler, research director at Gartner. “These disciplines focus squarely on
the uncertainty (as in, risk) as well as the methods or controls to reduce it. By doing so, the associated fear and doubt are
subsequently eliminated.”
Gartner Press Release; Gartner Survey Finds That Fear of Cyberattacks and Data Breaches Could Leave Enterprises Exposed to
Emerging Security Risks, November 7, 2013.
04
Identity as the New Security Perimeter
Given the increasing complexity of security threats and the
pace at which new ones emerge, it’s a challenge to balance
the competing priorities of protecting the business while
granting appropriate access and controlling cost and effort.
At the heart of this challenge is the fact that the traditional
network perimeter has disappeared in recent years.
It used to be that enterprise applications were contained
within a network firewall. Access was limited to internal
employees, and it was easy to manage identities and
understand the context of a user’s actions. However, as
online interactions expanded to include customers, mobile
users and business partners – as well as on-premise and
cloud- and Application Programming Interface (API)-based
applications – the traditional network perimeter has become
less and less effective.
Because the traditional perimeter is gone, IT must change
how it manages security and user identities in order to keep
critical data and applications secure. In this new landscape,
identity must become the new security perimeter.
GOOGLE	
  
	
  
	
  
Partner User
Customer
Mobile Employee
Internal Employee
Cloud Apps/Platforms
& Web Services
SaaS
Enterprise Apps
On-Premise
1
Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, May, 2014.
According to Ponemon Institute, the average cost of
a data breach for an organization in 2013 was $3.5
million U.S. dollars — a 15 increase since 2012.1
05
Traditionally, organizations have approached security from a technology-stack perspective, infusing IAM directly into the servers
(physical and virtual), databases, applications, operating systems and networks that comprise their IT infrastructures. However, with
the traditional perimeter disappearing and identity becoming the driving force behind new security paradigms, IT must take a more
holistic, centralized approach to identity and access security – an approach where IT brokers security between itself and all of the
application instances where business-critical data resides.
In order to effectively drive value and mitigate risk, such an approach requires not just IAM technology, but also alignment among
business processes, people and that technology – which means organizations should follow a top-down approach to security
transformation.
Together, Deloitte and CA Technologies take a broad, business-focused approach to helping clients address the identity and access
security lifecycle. It starts with a demonstrated framework as the foundation, and builds out to help organizations address specific
security vulnerabilities they may have. Specific solutions include:
The Need for a More Holistic, Centralized
IAM Approach
Identity and Access
Management
Framework
Privileged Identity
Management
Identity Management
and Governance
Advanced
Authentication
Mobile and
Cloud Security
06
Managing and protecting sensitive customer, business and personally
identifiable information (PII) is becoming increasingly complex and risky:
External threats from cyber criminals and hacktivists can exploit
identity-based data
Internal threats occur when poorly followed security practices create
holes for potential incursions
Security breaches have increased in scope and frequency in recent years
as more businesses store their data in digital files
IT productivity suffers as an expanded digital footprint makes it difficult
to manage increasing numbers of user identities and credentials
The joint Deloitte and CA Technologies Identity and Access Management
Framework was designed to help organizations overcome these challenges
from a business-process perspective. It begins with understanding where
digital identities live – in enterprise, cloud or siloed services – what they
can access, and to which job functions and processes they correspond.
The result? IAM solutions that interface with business processes to make
access to specific functions more intuitive, helping boost user productivity,
while maintaining a tight governance structure.
As pictured, the IAM Framework is composed of nine primary components
that can be deployed individually or in combination to meet an
organization’s needs. In addition, the framework incorporates governance
considerations, key IAM inputs, technical integration and ongoing support.
Identity and Access Management Framework
Security
Information
and Even
Management
Monitoring
and
Reporting
Data Loss
Prevention
and Data
Awareness
Business
Application
Enablement
Cloud
Application
Integration
Infrastructure
Protection
Mobile
Device
Integration
User Interaction
and Experience
Business Process
Integration and
Interaction
Regulatory and
Compliance
Mandates
Technology
Standardization and
Simplification
Management
Dashboard and
Performance Indicators
IAM Governance
and Organization
Model
Identity and
Access
Management
Framework
Identity
Mgmt.
PasswordMgmt.
Access
Mgmt.
Privilege
Identity
Mgmt.
RoleMgmt.
&Mining
Date &
Platform
Integration
Access
Certification
& Compliance
Physical
Access
Control
Risk
Based
Authentication
Runtime Operational Structure (Application Management Services)
Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
07
Identity Management and Governance
With today’s highly distributed and evolving business structures,
organizations are at greater risk of users having IT privileges that
are not appropriate for their current job function. Users with
excessive or inappropriate privileges can potentially wreak havoc
on a business, including violating compliance mandates or
causing leakage of confidential data.
The joint Deloitte and CA Technologies Identity Management
and Governance solution helps organizations avoid these risks by
automating management of users’ identities and what they can
access in an integrated and scalable solution across physical,
virtual and cloud-based environments.
Components of the Identity Management and
Governance Solution
Deloitte drives the engagement with the IAM Framework
and its complementary IAM Methods™ 2.0 methodology, an
iterative-based approach that leverages industry standards to
create a strategy and solution roadmap that clearly outlines
IAM initiatives, timelines and associated costs. As part of this
framework, Deloitte’s Role Management for Enterprise (RM4E)
methodology helps streamline access control issues using Role-
Based Access Control (RBAC). This includes, but is not limited to:
Defining enterprise role life cycle management
Role engineering
Deployment of technology to support role management
The diagram shows the high-level processes in role lifecycle
management.
CA Technologies powers the engagement with its industry-
leading IAM suite of products, including:
CA Identity Manager helps improve IT efficiency and
effectiveness by providing a scalable and configurable
foundation to organize identity information based on an
organization’s unique business roles and processes.
CA Identity Governance is a business-oriented solution
that leverages analytics and workflow to automate identity
governance processes, including entitlements clean-up,
segregation of duties, certification and role management.
Role
Definition
Role
Provisioning
User Access
Analysis
Role
Maintenance
Periodic Access
Review/
Certification
08
Privileged Identity Management
When privileged users are given all-powerful access (e.g.,
unrestricted “root” or “administrator” access) and are subject
to limited accountability, their identities can pose a significant
threat to network and data security.
The joint Deloitte and CA Technologies Privileged Identity
Management (PIM) solution helps organizations control the
activities of privileged users across different platforms and
environments, thus reducing the risks of a breach, compliance
failure or Intellectual Property (IP) loss.
Components of the PIM Solution
Deloitte drives the engagement with the IAM Framework and
its complementary IAM Methods 2.0 methodology. In addition,
Deloitte’s RM4E provides a demonstrated process around
role engineering which results in better investment from
the business. The diagram on the following page shows the
key activities to build roles for organizational groups.
CA Technologies powers the engagement with
CA Privileged Identity Manager, a scalable solution that
provides shared account password management, fine-grained
access controls, user activity reporting and UNIX authentication
across servers, applications and devices. This solution helps
organizations control admin actions, manage shared accounts
and meet compliance objectives.
Privileged Identity Management Continued
Initial Activities
Jum
pstart
Development
Role Validation
and Approval
Deployment
• Set stage for RM4E implementation
• Gather and review line of business (LOB) information
• Gather, review and assess LOB system access
information
1. Initial Activities
• Begin RM4E implementation
• Understand LOB functions and system access
• Initiate role design
• Select technology (Role Enginerring, Role
Lifecycle Management)
2. Jumpstart
• Conduct detailed role development
• Design RM4E process
• Design technology solution
• Provide training
3. Development
• Test roles, process and technology
• Identify exceptions
• Finalize roles with appropriate individuals and groups
• Obtain approval on roles
4. Role Validation & Approval
• Deploy enterprise roles
• Deploy RM4E process, procedures,
and guidelines
• Deploy technology
• Finalize LOB RM4E implementation
5. Deployment
09
Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
10
Advanced Authentication
As identity has become the new security perimeter, IT should respond
by placing a stronger emphasis than ever before on authentication (i.e.,
the process of ensuring that users truly are who they say they are).
How? By developing a secure, centralized method for providing layered,
risk-appropriate authentication that simplifies the user experience while
helping to ensure strong security.
The joint Deloitte and CA Technologies Advanced Authentication solution
addresses these business imperatives via an authentication model that
helps clients address these business imperatives, such as a user’s
identity, geolocation, device and past history.
Components of the Advanced Authentication Solution
Deloitte drives the engagement with the IAM Framework and its
complementary IAM Methods 2.0 methodology.
CA Technologies powers the engagement with the following
authentication solutions:
CA Risk Authentication combines a robust, rules-based system with
optional behavior-based modeling to help protect organizations from
both inappropriate access and fraud.
CA Strong Authentication provides a centralized system to manage
authentication methods, processes and credentials across a wide
range of use-case scenarios.
11
Mobile and Cloud Security
The growth in mobile apps, cloud services, developer
communities and the IoT (Internet of Things) has driven the
enterprise to open up valuable data through APIs. By exposing
data and application functionality to external users, apps and
machines, an organization can reshape its business model into
an extensible platform that can take advantage of new routes
to market and revenue streams. However, leveraging APIs can
mean having to contend with new and unpredictable identity
and access security risks.
The joint Deloitte and CA Technologies Mobile and Cloud
Security solution combines advanced functionality for backend
integration, mobile optimization, cloud orchestration and
developer management, enabling organizations to leverage
APIs for creating a consistent experience across web and
mobile apps from both a service and security perspective.
Components of the Mobile and Cloud
Security Solution
Deloitte drives the engagement with the IAM Framework
and its complementary IAM Methods 2.0 methodology.
In addition, Deloitte’s Risk Intelligent EnterpriseTM
framework
(see diagram on the following page) weaves important risk
management principles throughout the organization, to manage
risk associated with the Cloud Security solution implementation.
CA Technologies powers the engagement with the
following solutions:
CA API Management and Security provides enterprises with a
comprehensive set of solutions that externalize APIs in a secure,
reliable and manageable way, so they can maximize mobile app
development, bring your own device (BYOD), cloud connectivity,
partner and cross-divisional SOA integration and API developer
onboarding opportunities.
CA Secure Cloud provides identity management, advanced
authentication and federated single sign-on (SSO) capabilities
for cloud and on-premise applications, helping organizations
simplify security management and meet ongoing compliance
requirements.
Mobile and Cloud Security Continued
Vision
Oversight
Risk Infrastructure &
Management
Risk Ownership
Risk Classes
People Process Technology
Governance Strategy & Planning Operations/Infrastructure Compliance Reporting
Identify
Risks
Assess &
Evaluate
Risks
Integrate
Risks
Respond
to Risks
Design,
Implement &
Test Controls
Monitor,
Assure &
Escalate
Board of Directors
Executive Management
Business Units &
Supporting Functions
Cloud risk management strategy
Identify risk while adopting cloud
Risk impact analysis
Prioritize and respond to identified risk
Conduct internal audits to
identify gaps
Monitor and control on an
ongoing basis
Pathway to a Risk Intelligent EnterpriseTM
12
Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
The Business Benefits of IAM
Together, Deloitte and CA Technologies can help organizations
enable their business for growth and bring digital identities and
access rights under control by deploying an IAM solution that:
•	 Controls access to applications and data residing on-premise
or in the cloud
•	 Aligns user access rights with business responsibilities, while
providing unique capabilities to track and manage the use of
privileged user IDs
•	 Helps accelerate the delivery of secure, new business services,
while improving the user experience
•	 Helps mitigate risk by enabling centralized, consistent
security policies across the enterprise – including business
units, individual locations, systems and the points of business
partner and customer access
•	 Increases efficiency through business process automation
•	 Enhances compliance with federal mandates, laws and
regulations and Federal Identity, Credential, and Access
Management recommendations
As a result, organizations can effectively:
•	 Grow the business by remaining agile and accelerating the
delivery of web and mobile applications
•	 Protect the business by helping ensure that operations are
supported by security measures that protect critical corporate
and personal data – without impeding the user experience
13
Leading Organizations Achieve Positive IAM
Results with CA Technologies and Deloitte
14
Case Study: A Large, Vertically Integrated Marketer of Tires for the U.S. Automotive Replacement Market
Challenge:
The company was rolling out a new point-of-sale solution in 900 stores and needed a
solution for efficiently and securely managing user roles, identities and access for more
than 10,000 employees.
Solution:
The joint Identity Management and Governance solution from CA Technologies and
Deloitte, including:
•	 Deloitte’s IAM framework, which combined business processes, security and controls,
enterprise resource planning, project management and technology skills with in-depth
CA product knowledge to address the following areas:
–– Current-state analysis
–– Development of strategy, business case and roadmap
–– Solution design
–– Identity management program implementation and integration
Results:
•	 Improved productivity via efficient identity management of 10,000+ users
•	 Reduced risk profile via automation that helps the company address compliance
and audit requirements
•	 Increased long-term security posture with a roadmap that includes future
web access and privileged identity management projects
Leading Organizations Achieve Positive IAM
Results with CA Technologies and Deloitte Continued
Case Study: An Agency of a Canadian Provincial Government
Challenge:
The agency’s in-house collection services application was suffering from performance
issues and had become too expensive to maintain, so it was looking to implement a
commercial solution with integrated security and service assurance capabilities.
Solution:
The joint Identity Management and Governance solution from CA Technologies
and Deloitte.
Results:
•	 Improved performance and security of citizen services
•	 Accelerated implementation that sped time to value
•	 Simplified maintenance and improved support
15
16
About the Deloitte/CA Technologies Alliance
Deloitte has been providing enhanced services and solutions leveraging CA Technologies software for more than 10 years.
Deloitte’s global insights, knowledge and experience, combined with CA Technologies solutions, can assist customers in
effectively integrating technology, processes and people to tackle tough enterprise challenges and provide value from
IT investments.
Deloitte + CA Technologies at a Glance
CA Technologies Security Partner of the Year 2013
15,000+ trained security professionals
Specialized methodologies established for CA Technologies Security implementations
Demonstrated, industry-specific solutions across Financial Services, Energy, Retail, Entertainment and more
Active participation in CA Technologies product management and development via product beta evaluations, CA
security roadmap reviews and sharing of product enhancement ideas and suggestions gathered from numerous
client implementations
To learn more about how Deloitte and CA Technologies can help you realize more value from your IT investments
and protect your enterprise assets, visit www.ca.com/deloitte or email capartners@ca.com.
The Deloitte and CA Technologies alliance brings together the IT strategy and implementation skills of Deloitte’s experienced
practitioners with the applicable technologies from CA Technologies to help organizations better manage security risks and provide
greater value from their IT portfolio.
CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT
environments — from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT
environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and
services provide the insight and control essential for IT organizations to power business agility. The majority of the
Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems.
© Copyright CA 2014. All rights reserved. This document is for your informational purposes only and does not form any type of warranty. Case studies included herein represent
customer’s specific use and experience so actual results may vary. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure
of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
Deloitte Contacts
Jeremy Britton
Director
Cyber Risk Services
jebritton@deloitte.com
1.313.396.3558
Heather Varner
Business Development Manager
Cyber Risk Services
hvarner@deloitte.com
1.513.723.4152
CA Contact
Joe DiLaura CSAP
CA Technologies Global Account Director, Alliances
joseph.dilaura@ca.com
1.631.342.2767

More Related Content

What's hot

The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 

What's hot (20)

The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 

Similar to Growing and Protecting Business with Identity and Access Management

Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...happiestmindstech
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016Tim Grieveson
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write UpClaudia Toscano
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 

Similar to Growing and Protecting Business with Identity and Access Management (20)

Secure by design
Secure by designSecure by design
Secure by design
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Growing and Protecting Business with Identity and Access Management

  • 1. CA Technologies + Deloitte: Growing and Protecting the Business with Identity and Access Management
  • 2. Table of Contents The Opposing Forces of Growing and Protecting the Business..............................................3 Identity as the New Security Perimeter........................................................................................4 The Need for a More Holistic, Centralized IAM Approach........................................................5 Identity and Access Management Framework............................................................................6 Identity Management and Governance........................................................................................7 Privileged Identity Management....................................................................................................8 Advanced Authentication...............................................................................................................10 Mobile and Cloud Security.............................................................................................................11 The Business Benefits of IAM........................................................................................................ 13 Leading Organizations Achieve Positive IAM Results with CA Technologies and Deloitte...............................................................................................................................................14 Case Study: A Large, Vertically Integrated Marketer of Tires for the U.S. Automotive Replacement Market........................................................................................14 Case Study: The Revenue Agency of a Canadian Provincial Government........................15 About the Deloitte/CA Technologies Alliance........................................................................... 16 02
  • 3. 03 The Opposing Forces of Growing and Protecting the Business A number of technology trends, including cloud, mobility, social media and the consumerization of IT, have transformed not only IT, but also the way employees, partners and customers interact with an organization. And as software as a service (SaaS) and cloud applications have grown in popularity, IT environments have become more distributed, fragmented and nebulous – with many components existing outside of the traditional security perimeter of firewalls and virtual private networks (VPNs). As a result, protecting today’s cloud-based, mobile enterprise requires a new approach – one that focuses on secure identity and access management (IAM), while at the same time driving two critical imperatives: Enable business growth by: • Quickly deploying new online services • Leveraging new advances in cloud computing and virtualization • Accommodating the needs of demanding, tech-savvy users (i.e., customers, partners, employees, etc.) • Driving greater employee productivity and increasing business intelligence Protect the business by: • Mitigating the risk of fraud, breaches, insider threats and improper access – from both internal and external sources • Safeguarding critical systems, applications and data “While the shift to strengthening technical security controls is not surprising given the hype around cyber-attacks and data security breaches, strong risk-based disciplines, such as enterprise risk management or risk-based information security, are rooted in proactive, data-driven decision making,” said John A. Wheeler, research director at Gartner. “These disciplines focus squarely on the uncertainty (as in, risk) as well as the methods or controls to reduce it. By doing so, the associated fear and doubt are subsequently eliminated.” Gartner Press Release; Gartner Survey Finds That Fear of Cyberattacks and Data Breaches Could Leave Enterprises Exposed to Emerging Security Risks, November 7, 2013.
  • 4. 04 Identity as the New Security Perimeter Given the increasing complexity of security threats and the pace at which new ones emerge, it’s a challenge to balance the competing priorities of protecting the business while granting appropriate access and controlling cost and effort. At the heart of this challenge is the fact that the traditional network perimeter has disappeared in recent years. It used to be that enterprise applications were contained within a network firewall. Access was limited to internal employees, and it was easy to manage identities and understand the context of a user’s actions. However, as online interactions expanded to include customers, mobile users and business partners – as well as on-premise and cloud- and Application Programming Interface (API)-based applications – the traditional network perimeter has become less and less effective. Because the traditional perimeter is gone, IT must change how it manages security and user identities in order to keep critical data and applications secure. In this new landscape, identity must become the new security perimeter. GOOGLE       Partner User Customer Mobile Employee Internal Employee Cloud Apps/Platforms & Web Services SaaS Enterprise Apps On-Premise 1 Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, May, 2014. According to Ponemon Institute, the average cost of a data breach for an organization in 2013 was $3.5 million U.S. dollars — a 15 increase since 2012.1
  • 5. 05 Traditionally, organizations have approached security from a technology-stack perspective, infusing IAM directly into the servers (physical and virtual), databases, applications, operating systems and networks that comprise their IT infrastructures. However, with the traditional perimeter disappearing and identity becoming the driving force behind new security paradigms, IT must take a more holistic, centralized approach to identity and access security – an approach where IT brokers security between itself and all of the application instances where business-critical data resides. In order to effectively drive value and mitigate risk, such an approach requires not just IAM technology, but also alignment among business processes, people and that technology – which means organizations should follow a top-down approach to security transformation. Together, Deloitte and CA Technologies take a broad, business-focused approach to helping clients address the identity and access security lifecycle. It starts with a demonstrated framework as the foundation, and builds out to help organizations address specific security vulnerabilities they may have. Specific solutions include: The Need for a More Holistic, Centralized IAM Approach Identity and Access Management Framework Privileged Identity Management Identity Management and Governance Advanced Authentication Mobile and Cloud Security
  • 6. 06 Managing and protecting sensitive customer, business and personally identifiable information (PII) is becoming increasingly complex and risky: External threats from cyber criminals and hacktivists can exploit identity-based data Internal threats occur when poorly followed security practices create holes for potential incursions Security breaches have increased in scope and frequency in recent years as more businesses store their data in digital files IT productivity suffers as an expanded digital footprint makes it difficult to manage increasing numbers of user identities and credentials The joint Deloitte and CA Technologies Identity and Access Management Framework was designed to help organizations overcome these challenges from a business-process perspective. It begins with understanding where digital identities live – in enterprise, cloud or siloed services – what they can access, and to which job functions and processes they correspond. The result? IAM solutions that interface with business processes to make access to specific functions more intuitive, helping boost user productivity, while maintaining a tight governance structure. As pictured, the IAM Framework is composed of nine primary components that can be deployed individually or in combination to meet an organization’s needs. In addition, the framework incorporates governance considerations, key IAM inputs, technical integration and ongoing support. Identity and Access Management Framework Security Information and Even Management Monitoring and Reporting Data Loss Prevention and Data Awareness Business Application Enablement Cloud Application Integration Infrastructure Protection Mobile Device Integration User Interaction and Experience Business Process Integration and Interaction Regulatory and Compliance Mandates Technology Standardization and Simplification Management Dashboard and Performance Indicators IAM Governance and Organization Model Identity and Access Management Framework Identity Mgmt. PasswordMgmt. Access Mgmt. Privilege Identity Mgmt. RoleMgmt. &Mining Date & Platform Integration Access Certification & Compliance Physical Access Control Risk Based Authentication Runtime Operational Structure (Application Management Services) Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
  • 7. 07 Identity Management and Governance With today’s highly distributed and evolving business structures, organizations are at greater risk of users having IT privileges that are not appropriate for their current job function. Users with excessive or inappropriate privileges can potentially wreak havoc on a business, including violating compliance mandates or causing leakage of confidential data. The joint Deloitte and CA Technologies Identity Management and Governance solution helps organizations avoid these risks by automating management of users’ identities and what they can access in an integrated and scalable solution across physical, virtual and cloud-based environments. Components of the Identity Management and Governance Solution Deloitte drives the engagement with the IAM Framework and its complementary IAM Methods™ 2.0 methodology, an iterative-based approach that leverages industry standards to create a strategy and solution roadmap that clearly outlines IAM initiatives, timelines and associated costs. As part of this framework, Deloitte’s Role Management for Enterprise (RM4E) methodology helps streamline access control issues using Role- Based Access Control (RBAC). This includes, but is not limited to: Defining enterprise role life cycle management Role engineering Deployment of technology to support role management The diagram shows the high-level processes in role lifecycle management. CA Technologies powers the engagement with its industry- leading IAM suite of products, including: CA Identity Manager helps improve IT efficiency and effectiveness by providing a scalable and configurable foundation to organize identity information based on an organization’s unique business roles and processes. CA Identity Governance is a business-oriented solution that leverages analytics and workflow to automate identity governance processes, including entitlements clean-up, segregation of duties, certification and role management. Role Definition Role Provisioning User Access Analysis Role Maintenance Periodic Access Review/ Certification
  • 8. 08 Privileged Identity Management When privileged users are given all-powerful access (e.g., unrestricted “root” or “administrator” access) and are subject to limited accountability, their identities can pose a significant threat to network and data security. The joint Deloitte and CA Technologies Privileged Identity Management (PIM) solution helps organizations control the activities of privileged users across different platforms and environments, thus reducing the risks of a breach, compliance failure or Intellectual Property (IP) loss. Components of the PIM Solution Deloitte drives the engagement with the IAM Framework and its complementary IAM Methods 2.0 methodology. In addition, Deloitte’s RM4E provides a demonstrated process around role engineering which results in better investment from the business. The diagram on the following page shows the key activities to build roles for organizational groups. CA Technologies powers the engagement with CA Privileged Identity Manager, a scalable solution that provides shared account password management, fine-grained access controls, user activity reporting and UNIX authentication across servers, applications and devices. This solution helps organizations control admin actions, manage shared accounts and meet compliance objectives.
  • 9. Privileged Identity Management Continued Initial Activities Jum pstart Development Role Validation and Approval Deployment • Set stage for RM4E implementation • Gather and review line of business (LOB) information • Gather, review and assess LOB system access information 1. Initial Activities • Begin RM4E implementation • Understand LOB functions and system access • Initiate role design • Select technology (Role Enginerring, Role Lifecycle Management) 2. Jumpstart • Conduct detailed role development • Design RM4E process • Design technology solution • Provide training 3. Development • Test roles, process and technology • Identify exceptions • Finalize roles with appropriate individuals and groups • Obtain approval on roles 4. Role Validation & Approval • Deploy enterprise roles • Deploy RM4E process, procedures, and guidelines • Deploy technology • Finalize LOB RM4E implementation 5. Deployment 09 Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
  • 10. 10 Advanced Authentication As identity has become the new security perimeter, IT should respond by placing a stronger emphasis than ever before on authentication (i.e., the process of ensuring that users truly are who they say they are). How? By developing a secure, centralized method for providing layered, risk-appropriate authentication that simplifies the user experience while helping to ensure strong security. The joint Deloitte and CA Technologies Advanced Authentication solution addresses these business imperatives via an authentication model that helps clients address these business imperatives, such as a user’s identity, geolocation, device and past history. Components of the Advanced Authentication Solution Deloitte drives the engagement with the IAM Framework and its complementary IAM Methods 2.0 methodology. CA Technologies powers the engagement with the following authentication solutions: CA Risk Authentication combines a robust, rules-based system with optional behavior-based modeling to help protect organizations from both inappropriate access and fraud. CA Strong Authentication provides a centralized system to manage authentication methods, processes and credentials across a wide range of use-case scenarios.
  • 11. 11 Mobile and Cloud Security The growth in mobile apps, cloud services, developer communities and the IoT (Internet of Things) has driven the enterprise to open up valuable data through APIs. By exposing data and application functionality to external users, apps and machines, an organization can reshape its business model into an extensible platform that can take advantage of new routes to market and revenue streams. However, leveraging APIs can mean having to contend with new and unpredictable identity and access security risks. The joint Deloitte and CA Technologies Mobile and Cloud Security solution combines advanced functionality for backend integration, mobile optimization, cloud orchestration and developer management, enabling organizations to leverage APIs for creating a consistent experience across web and mobile apps from both a service and security perspective. Components of the Mobile and Cloud Security Solution Deloitte drives the engagement with the IAM Framework and its complementary IAM Methods 2.0 methodology. In addition, Deloitte’s Risk Intelligent EnterpriseTM framework (see diagram on the following page) weaves important risk management principles throughout the organization, to manage risk associated with the Cloud Security solution implementation. CA Technologies powers the engagement with the following solutions: CA API Management and Security provides enterprises with a comprehensive set of solutions that externalize APIs in a secure, reliable and manageable way, so they can maximize mobile app development, bring your own device (BYOD), cloud connectivity, partner and cross-divisional SOA integration and API developer onboarding opportunities. CA Secure Cloud provides identity management, advanced authentication and federated single sign-on (SSO) capabilities for cloud and on-premise applications, helping organizations simplify security management and meet ongoing compliance requirements.
  • 12. Mobile and Cloud Security Continued Vision Oversight Risk Infrastructure & Management Risk Ownership Risk Classes People Process Technology Governance Strategy & Planning Operations/Infrastructure Compliance Reporting Identify Risks Assess & Evaluate Risks Integrate Risks Respond to Risks Design, Implement & Test Controls Monitor, Assure & Escalate Board of Directors Executive Management Business Units & Supporting Functions Cloud risk management strategy Identify risk while adopting cloud Risk impact analysis Prioritize and respond to identified risk Conduct internal audits to identify gaps Monitor and control on an ongoing basis Pathway to a Risk Intelligent EnterpriseTM 12 Copyright © 2014 Deloitte Development LLC. All Rights Reserved.
  • 13. The Business Benefits of IAM Together, Deloitte and CA Technologies can help organizations enable their business for growth and bring digital identities and access rights under control by deploying an IAM solution that: • Controls access to applications and data residing on-premise or in the cloud • Aligns user access rights with business responsibilities, while providing unique capabilities to track and manage the use of privileged user IDs • Helps accelerate the delivery of secure, new business services, while improving the user experience • Helps mitigate risk by enabling centralized, consistent security policies across the enterprise – including business units, individual locations, systems and the points of business partner and customer access • Increases efficiency through business process automation • Enhances compliance with federal mandates, laws and regulations and Federal Identity, Credential, and Access Management recommendations As a result, organizations can effectively: • Grow the business by remaining agile and accelerating the delivery of web and mobile applications • Protect the business by helping ensure that operations are supported by security measures that protect critical corporate and personal data – without impeding the user experience 13
  • 14. Leading Organizations Achieve Positive IAM Results with CA Technologies and Deloitte 14 Case Study: A Large, Vertically Integrated Marketer of Tires for the U.S. Automotive Replacement Market Challenge: The company was rolling out a new point-of-sale solution in 900 stores and needed a solution for efficiently and securely managing user roles, identities and access for more than 10,000 employees. Solution: The joint Identity Management and Governance solution from CA Technologies and Deloitte, including: • Deloitte’s IAM framework, which combined business processes, security and controls, enterprise resource planning, project management and technology skills with in-depth CA product knowledge to address the following areas: –– Current-state analysis –– Development of strategy, business case and roadmap –– Solution design –– Identity management program implementation and integration Results: • Improved productivity via efficient identity management of 10,000+ users • Reduced risk profile via automation that helps the company address compliance and audit requirements • Increased long-term security posture with a roadmap that includes future web access and privileged identity management projects
  • 15. Leading Organizations Achieve Positive IAM Results with CA Technologies and Deloitte Continued Case Study: An Agency of a Canadian Provincial Government Challenge: The agency’s in-house collection services application was suffering from performance issues and had become too expensive to maintain, so it was looking to implement a commercial solution with integrated security and service assurance capabilities. Solution: The joint Identity Management and Governance solution from CA Technologies and Deloitte. Results: • Improved performance and security of citizen services • Accelerated implementation that sped time to value • Simplified maintenance and improved support 15
  • 16. 16 About the Deloitte/CA Technologies Alliance Deloitte has been providing enhanced services and solutions leveraging CA Technologies software for more than 10 years. Deloitte’s global insights, knowledge and experience, combined with CA Technologies solutions, can assist customers in effectively integrating technology, processes and people to tackle tough enterprise challenges and provide value from IT investments. Deloitte + CA Technologies at a Glance CA Technologies Security Partner of the Year 2013 15,000+ trained security professionals Specialized methodologies established for CA Technologies Security implementations Demonstrated, industry-specific solutions across Financial Services, Energy, Retail, Entertainment and more Active participation in CA Technologies product management and development via product beta evaluations, CA security roadmap reviews and sharing of product enhancement ideas and suggestions gathered from numerous client implementations To learn more about how Deloitte and CA Technologies can help you realize more value from your IT investments and protect your enterprise assets, visit www.ca.com/deloitte or email capartners@ca.com. The Deloitte and CA Technologies alliance brings together the IT strategy and implementation skills of Deloitte’s experienced practitioners with the applicable technologies from CA Technologies to help organizations better manage security risks and provide greater value from their IT portfolio.
  • 17. CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments — from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. © Copyright CA 2014. All rights reserved. This document is for your informational purposes only and does not form any type of warranty. Case studies included herein represent customer’s specific use and experience so actual results may vary. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Deloitte Contacts Jeremy Britton Director Cyber Risk Services jebritton@deloitte.com 1.313.396.3558 Heather Varner Business Development Manager Cyber Risk Services hvarner@deloitte.com 1.513.723.4152 CA Contact Joe DiLaura CSAP CA Technologies Global Account Director, Alliances joseph.dilaura@ca.com 1.631.342.2767