© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And...
-
Upload
dashawn-horne -
Category
Documents
-
view
220 -
download
2
Transcript of © 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And...
© 2013 IBM Corporation
IBM Security Systems
1© 2013 IBM Corporation
Identity Management
And Session Recording
A Partnership with IBM and ObserveIT
© 2013 IBM Corporation
IBM Security Systems
2
Agenda
Session Recording– What does ObserveIT offer?– How does it compare with Cyberark and Balabit?– What customers use ObserveIT?– Where can you get more information?
IBM Security Privileged Identity Management– Value Proposition– How ObserveIT can complement ISPIM
© 2013 IBM Corporation
IBM Security Systems
3
What does ObserveIT offer?
© 2013 IBM Corporation
IBM Security Systems
4
What does ObserveIT offer?
© 2013 IBM Corporation
IBM Security Systems
5
What does ObserveIT offer?
© 2013 IBM Corporation
IBM Security Systems
6
What does ObserveIT offer?
© 2013 IBM Corporation
IBM Security Systems
7
What does ObserveIT offer?
© 2013 IBM Corporation
IBM Security Systems
8
How does it compare with Cyberark and Balabit?
ObserveIT provides a unique approach over these competitors. Key differences are:– It does not require a gateway appliance to be installed to route the user sessions
through; enabling a more complete capture of user sessions– Session recording are indexed and tagged; enabling faster search time
ObserveIT: Video capture + text audit log analysis of user sessions
ObserveIT gives you much more intelligence, by generating a detailed metadata log of all user activity. (Apps launched, file names, URL’s, window titles, system calls, resources affected etc.) This table-of-contents for each session allows you to quickly see the scope of each session at a glance and search for relevant sessions, without the need to replaythe entire video.
ObserveIT: Can be deployed on each user desktop, and can be deployed in VMs and published applications.
Many security audits also require that desktop activity be monitored for sensitive business apps (ex: SAP, Salesforce), especially when the logs of these apps are not sufficient to show exactly what users did.
© 2013 IBM Corporation
IBM Security Systems
9
What customers use ObserveIT?
© 2013 IBM Corporation
IBM Security Systems
10
Where can you get more information?
ObserveIT Web Site (http://www.observeit-sys.com/)
IBM DeveloperWorks (Ready for IBM Security Intelligence Community)(https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/W84d0964e6911_4d3b_a883_3de19eb0b2a6/page/Information%20on%20ObserveIT?lang=en)
© 2013 IBM Corporation
IBM Security Systems
11
IBM Security Privileged Identity Manager
© 2013 IBM Corporation
IBM Security Systems
12
IBM Security Privileged Identity Manager Overview
IBM Security Privileged Identity Manager
Centrally manage, audit and control shared identities across the enterprise
Key solution highlights Control shared access to sensitive UserIDs
– Check-in / check-out using secure credential vault
Request, approve and re-validate privileged access – Reduce risk, enhance compliance
Track usage of shared identities– Provide accountability
Automated password management– Automated checkout of IDs, hide password from requesting
employee, automate password reset to eliminate password theft
DatabasesAdminID
IBM security solution IBM’s Privileged Identity Management (PIM) solution
providing complete identity management and enterprise single sign-on capabilities for privileged users
© 2013 IBM Corporation
IBM Security Systems
13
Capability Benefit
Centralize Privileged ID management Improves IT governance and reduces risk
Securely share privileged identities Avoids the high cost of identity proliferation
Automate sign on and check-in/out with strong authentication support
Increases security
Wide variety of out-of-the-box adapters and preconfigured access profiles
Improves time to value
Full Identity Management and Enterprise Single Sign on capabilities
Provides comprehensive solution for privileged users
Easily expand existing IBM IAM environments to add PIM
Common identity infrastructure for privileged and non-privileged users reduces operations costs
Approve, Revalidate Privileged IDs & Shared ID Pools
Value proposition: IBM provides a comprehensive solution to securely control privileged identity use
Automate Single Sign On and password management
Control Shared Access
Monitor and Track Usage
© 2013 IBM Corporation
IBM Security Systems
14
ObserveIT and IBM combined provide a powerful privileged identity management solution
IBM Security Privileged Identity Manager provides:– Secure approach for sharing privileged identities– Automated single signon for privileged users– Policy-based privileged identity governance– Integrated with IBM’s award winning Identity and Access
Management technologies
ObserveIT supplements the IBM solution and provides an even stronger level of governance by adding:
– Robust session recording capabilities– Recording archive with advanced search capabilities– Addresses requirements for privileged user activity
tracking
IBM Security Systems
© 2013 IBM Corporation
IBM Security Systems
15
ibm.com/security