Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance STEALTHbits Technologies Strong Management Team Data & Access Governance Expertise Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments Strong Partner Ecosystem Strong & Growing Customer Base 7 of the top 10 Financial Services firms 3 of the top 5 Property Insurance firms 2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms Business Challenges Access Sprawl o Joiners, Mover, Leaver Activity o Access Never thoroughly Reviewed/Adjusted o Distributed Entitlement Stores Data Explosion o o o o 80% of Data is Unstructured 30-40% of that data is sensitive Gartner predicts 650% increase in next 5 years Big Data, Cloud, Virtualization, Mobility & Social Risk Exposure on the Rise o Brand, Revenue & Reputation Exposure o Security Breach / Compliance Findings o Service Level Impacts What does this really mean? No Visibility into Effective Permissions No Understanding of Data Ownership No Common Access or Permission Standards No Ability to Transform Groups or ACLs No Ability to Automate Access Management StealthAUDIT For Data & Access Governance Holistically Safeguard Your Data and Access Who Has Access? DISCOVER What Are they Doing? PRIORITIZE How Do I Manage It? REMEDIATE StealthAUDIT Management Platform (SMP) 6 Access Governance Lifecycle Active Directory Cleanup Access Transformation M&A Migrations Open File Shares Unused Permissions Over-Provisioning IAM Integration Identify Owners Role Modeling Entitlement Reviews IAM Policy Creation Executive Oversight How Can STEALTHbits Help IBM? Differentiate IBM vs. Competition New ISIM License Sales / Protect Renewals Grow Upsell Opportunities Expand Access to Security & Audit Stakeholders More Revenue & Quicker Quota Retirement What Can You Offer Your Clients? Automated Access Governance For Unstructured Data o Request, Provision, Review, Revoke Deliver the Right Access to the Right People o Who should have access and to what extent Reduce Risk – satisfy Security & Compliance Need o Repeatable Security Practices, Fully Audited Current State of IAM Traditional IAM Platforms are Blind to Unstructured Data Directory Services Applications SharePoint & Email File Systems Databases StealthAUDIT Eliminates the Blindspot! Discover the Unstructured Data Resources Correlate Access & Permissions Publish to ISIM Determine Resource Ownership ADCD PDB Virtual Entitlements Store Directory Services Applications SharePoint & Email File Systems Databases Leverage Same Request Process for Unstructured Data! Approval Workflow Self-Service Access Request Access Granted via Security Group ADCD PDB Virtual Entitlements Store Directory Services Applications SharePoint & Email File Systems Databases IBM Security Identity Manager & StealthAUDIT Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share! Questions? Appendix: Steps to Publish to StealthAUDIT data to ISIM Click Through For Summary of StealthAUDIT & ISIM Integration Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Select Resource, Click Publish Search for, Request or Approve Once Published, Click Close - Next, Login shares in Access to published into ISIM to view published Select Resource Based Groups, ISIMResources Login with ISIM Credentials Click Finish