Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access...
Transcript of Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access...
![Page 1: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/1.jpg)
Rethinking Identity and Access Governance
Jörn Dierks
Chief Security Strategist EMEA
20/03/2013
![Page 2: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/2.jpg)
© 2013 NetIQ Corporation. All rights reserved. 2
Every Organization is Different Extended Enterprise Presents IAM Challenges In Three Dimensions
Forrester Research, Inc. “Navigate The Future Of Identity And Access Management” - Eve Maler, March 22. 2012
![Page 3: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/3.jpg)
© 2013 NetIQ Corporation. All rights reserved. 3
How Does IT Maintain Control? You may need to rethink your approach to identity and access
![Page 4: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/4.jpg)
© 2013 NetIQ Corporation. All rights reserved. 4
It’s All About Access What does it all mean and what should it do for you?
Elements of Identity
- Who/What are you?
- Name, location, etc.
- Roles/Privilege
- Title, Manager, etc.
- Relationship to business
- Employee, Contractor, etc.
Access is a Relationship
- Applications
- Systems
- Data
- Resources
- Physical Facilities
Access Utilization
- Is activity aligned to roles and policy
- Orphans, dormant access and entitlement creep
- Privileged access control
- Distinguish attacker from insider activity
![Page 5: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/5.jpg)
© 2013 NetIQ Corporation. All rights reserved. 5
It’s All About The Right Access Right People, Right Resources, Right Time from Anywhere
![Page 6: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/6.jpg)
© 2013 NetIQ Corporation. All rights reserved. 6
Flexibility Control
What is “Right” Varies By Organization Moving at the speed of business vs. mitigating business risks
![Page 7: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/7.jpg)
© 2013 NetIQ Corporation. All rights reserved. 7
Right Access Requires Proper Context What, Where, Why and When add critical value to the Who
Who
What
Where
Why
When
Who has access to what?
Where is the access originating from?
When was the access granted?
Is the access appropriate?
What is being accessed?
Why was the access granted?
![Page 8: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/8.jpg)
© 2013 NetIQ Corporation. All rights reserved. 8
Right Access = Intelligent Access Right people, right resources, right time, right device, right location
• Clearly understanding the 5 W’s
– More context around Who for better access decisions
• Organizational needs are in balance
– Business Needs
– Business policies and controls are in place
– Organizational risk threshold is reflected in polices and controls
– IT Resources and Assets
– What is available, what are IT’s capabilities?
– What is the business getting out of the IT investment?
“We have brakes on our cars not so that we can stop, but so that we can go fast” – Sara Gates
Who
What
Where
Why
When
Flexibility Control
![Page 9: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/9.jpg)
Why Should You Care About
Intelligent Access?
![Page 10: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/10.jpg)
© 2013 NetIQ Corporation. All rights reserved. 10
Mitigate Risk – Stay Out of the Press
~ $7 Billion Loss
~ $2 Billion Loss
![Page 11: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/11.jpg)
© 2013 NetIQ Corporation. All rights reserved. 11
Regulatory & Oversight Pressures
Internal Audit
Board of Directors – Oversight Groups
![Page 12: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/12.jpg)
© 2013 NetIQ Corporation. All rights reserved. 12
Move At The Speed of Business IT should enable business agility vs. acting as a roadblock
VS.
IT should be the catalyst for the solution
![Page 13: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/13.jpg)
© 2013 NetIQ Corporation. All rights reserved. 13
Bringing IT and The Business Together B
usin
ess N
eeds
IT R
eso
urc
es /
Asse
ts
Access Fulfillment
• Identity Management • Granted access
• Active decision • Automated process
• Access administration
Access Authorization
• Access Management • Enforcement of access
• Users, partners, customers, etc.
Access Monitoring
• Security Management • Tracking and observing
what is being done with the access
• Improper activity
3 Key Processes of Intelligent Access
![Page 14: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/14.jpg)
© 2013 NetIQ Corporation. All rights reserved. 14
What Are Your Priorities and Needs? Access fulfillment, authorization and monitoring
Busin
ess N
eeds
IT R
eso
urc
es /
Asse
ts Key Capabilities To Deliver Intelligent Access
Access Fulfillment
Access Authorization
Access Monitoring
Access Certification
Access Request Access
Administration
Single Sign-on User
Authentication Authorization Enforcement
Dashboards, Risks & Trends
Security & Activity
Intelligence
Forensic Analytics & Reporting
Delegated Administration
Privileged Access Management
Log Management Reporting
![Page 15: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/15.jpg)
Use-Case
![Page 16: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/16.jpg)
© 2013 NetIQ Corporation. All rights reserved. 16
Use-Case – Wire Transfer Fraud
FBI Fraud Alert
Cyber Criminals Targeting
Financial Institution
Employee Credentials
to Conduct Wire
Transfer Fraud
![Page 17: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/17.jpg)
© 2013 NetIQ Corporation. All rights reserved. 17
Use-Case – Wire Transfer Fraud
• Use-Case:
– Cyber Criminals Target Finalcial Institution Employee
Credentials to Conduct Wire Transfer Fraud
– Released by the FBI (and others) on Sept 17, 2012
• What‘s the story?
– Spam and phishing to target victims
– Keyloggers and Remote Access Trojans installed
on employee‘s computer
– Variants of ZeuS malware used to steal employee‘s
credentials in some cases
– In some cases, multiple employee credentials and
admin credentials were stolen, wire tranfer limits raised
![Page 18: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/18.jpg)
© 2013 NetIQ Corporation. All rights reserved. 18
Use-Case – Wire Transfer Fraud
• What‘s the story? (continued)
– Authentication methods used to deter fraudulent activity
were circumvented, allowing intruders to handle all aspects
of a wire transaction, incl. approval.
– Unauthorized logins outside of normal hours, allowing actors
to obtain account transaction history, learn about wire transfer
system, read manuals and training on the use of the systems.
– In at least one instance, the actors browsed through accounts,
apparently selecting the ones with the highest balance.
– Victims: Small-to-medium sized banks, however a few large
banks have also been affected.
– In some incidents, DDoS attacks were used to distract
bank‘s personnel.
![Page 19: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/19.jpg)
© 2013 NetIQ Corporation. All rights reserved. 19
Align Business and Security
• Difficult to achieve
• Common issues:
– Language
– Needs
– Awareness
– Complexity
– Management buy-in
– Silo-thinking
– And many more
![Page 20: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/20.jpg)
© 2013 NetIQ Corporation. All rights reserved. 20
Identify the Real Risks
• What is our risk posture?
• Do we understand risk?
• Do we measure risk?
• Do we do it right?
– ...really?
– Who determines what
is “right“?
– ...so again:
• Do we understand the
risks we‘re facing?
![Page 21: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/21.jpg)
© 2013 NetIQ Corporation. All rights reserved. 21
People are Key
Very often, people are the weakest link.
Think of Awareness
![Page 22: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/22.jpg)
Needs Analysis
![Page 23: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/23.jpg)
© 2013 NetIQ Corporation. All rights reserved. 23
Bottom-Up
Typical / Traditional Approach
Security Point Products
Security Management
Operationalization
![Page 24: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/24.jpg)
© 2013 NetIQ Corporation. All rights reserved. 24
Typical Approach: Silos Prevent Intelligent Analytics
Se
cu
rity
po
licie
s
Viru
s/m
alw
are
de
tectio
n
Co
nfig
ura
tio
n
Vu
lne
rab
ility
Lo
g m
on
ito
rin
g
Id
en
tity
Go
ve
rna
nce
SIE
M
![Page 25: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/25.jpg)
IMPACT
What is the
![Page 26: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/26.jpg)
© 2013 NetIQ Corporation. All rights reserved. 26
Verizon Data Breach Report 2012
• 92%
of breaches was
discovered by a third party
• 85%
of breaches took weeks or
more to discover
• 84%
of organizations had
evidence in their log files
![Page 27: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/27.jpg)
© 2013 NetIQ Corporation. All rights reserved. 27
Alternative Approach
Top-Down
Security Management and Operations
Security Metrics
Business Processes
![Page 28: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/28.jpg)
© 2013 NetIQ Corporation. All rights reserved. 28
Threat Landscape in a Single Pane of Glass
![Page 29: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/29.jpg)
Let‘s Come Back to the Use-Case
![Page 30: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/30.jpg)
© 2013 NetIQ Corporation. All rights reserved. 30
Use-Case – Wire Transfer Fraud
• So what to do?
– FBI released a list of advices around people, process and
technology
– Bird‘s Eye View:
– Many components come together
– Including spam and phishing, account mis-use, out-of-hour usage,
privileged account mis-use, DDoS activity, etc.
– What can Security Management do?
– Change Detection and Privileged User Monitoring
– Security Information and Event Management (SIEM)
– Anomaly Detection and Security Dashboards
– Privileged user access restrictions
![Page 31: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/31.jpg)
© 2013 NetIQ Corporation. All rights reserved. 31
Use-Case – Wire Transfer Fraud
• So what to do? (continued)
– And outside of Security Management?
– Identity and Access Management
– Seggragation of duty and two-man rule
– Access Governance
– Fraud Detection
– Anti-Virus, Anti-Spam, Anti-Phishing
– Application White-Listing
– And what about Dashboards and Metrics?
– Build the Business Service of Wire Transfers
– Implement supporting technology event feeds to visualize service
disruptions AND anomalies
![Page 32: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/32.jpg)
Solution Overview
![Page 33: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/33.jpg)
© 2013 NetIQ Corporation. All rights reserved. 33
Wire Transaction Process
Understand the business process…
Transaction request
Transaction approval
Wire transfer
…and analyze its building blocks.
![Page 34: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/34.jpg)
© 2013 NetIQ Corporation. All rights reserved. 34
NetIQ Solution Design – Example
Secure Configuration
Manager
Change Guardian
Sentinel 7
Secure Configuration Manager: • Detecting configuration drift • Policy compliance • Baselining • Exception management • Patch Assessment
Change Guardian: • Highly enriched audit trails • Change detection and alerting • Privileged user monitoring
Sentinel 7: • Security Information
and Event Management (SIEM) drives the Security Operation Center
Eve
nts
NetIQ Operations Center Dashboard
Inte
gra
tio
n
3rd Party IT Solutions • System Monitoring /
Management • CMDB • Etc.
3rd Party Security Solutions • IDS-Intrusion Detection
Systems • DLP-Data Leakage
Prevention
Other NetIQ Solutions: • Identity Manager • Access Manager • Access Governance Suite • Privileged User Manager
![Page 35: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/35.jpg)
![Page 36: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/36.jpg)
![Page 37: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/37.jpg)
![Page 38: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/38.jpg)
![Page 39: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/39.jpg)
![Page 40: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/40.jpg)
![Page 41: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/41.jpg)
![Page 42: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/42.jpg)
![Page 43: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/43.jpg)
![Page 44: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/44.jpg)
![Page 45: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/45.jpg)
Summary
![Page 46: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/46.jpg)
© 2013 NetIQ Corporation. All rights reserved. 46
NetIQ’s Approach
• Rethinking Identity and Access by viewing Security as
a business process and aligning activities
• Bottom-up approaches only solve point problems,
but don’t show the big picture
– One of the results of this: Security is seen as a cost center
• NetIQ’s top-down approach assures
that IS is seen as business-relevant
– Result: Business alignment, proper
visibility, greater awareness through
executive sponsoring, etc.
![Page 47: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/47.jpg)
© 2013 NetIQ Corporation. All rights reserved. 47
What Are Your Priorities and Needs? Access fulfillment, authorization and monitoring
Busin
ess N
eeds
IT R
eso
urc
es /
Asse
ts Key Capabilities To Deliver Intelligent Access
Access Fulfillment
Access Authorization
Access Monitoring
Access Certification
Access Request Access
Administration
Single Sign-on User
Authentication Authorization Enforcement
Dashboards, Risks & Trends
Security & Activity
Intelligence
Forensic Analytics & Reporting
Delegated Administration
Privileged Access Management
Log Management Reporting
![Page 48: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/48.jpg)
© 2013 NetIQ Corporation. All rights reserved. 48
So, What’s Next? Rethinking your identity, access and security
• Every organization is different – no one size fits all
solution exists
– Where do you start?
– What is most important to you?
– Short-term and long-term goals
• NetIQ has the answers
– Leader in Identity, Access, Governance, and Security
– This is just the first conversation
– We would love to continue the discussion
![Page 49: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/49.jpg)
© 2013 NetIQ Corporation. All rights reserved. 49
For More Information
• NetIQ Website White Papers
– www.netiq.com
• Local NetIQ Contact
![Page 50: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/50.jpg)
Any Questions?
![Page 52: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/52.jpg)
© 2013 NetIQ Corporation. All rights reserved. 52
+1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) [email protected] NetIQ.com
Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA
http://community.netiq.com
![Page 53: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process](https://reader034.fdocuments.in/reader034/viewer/2022050511/5f9c58a09655a51aaf2b3d75/html5/thumbnails/53.jpg)
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2013 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.