GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

Similar documents
Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Keep the Door Open for Users and Closed to Hackers

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

PRIVILEGED ACCESS MANAGEMENT: The Key to Protecting Your Business Amid Cybercrime s Current Boom

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Teradata and Protegrity High-Value Protection for High-Value Data

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

CipherCloud CASB+ Connector for ServiceNow

the SWIFT Customer Security

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Virtual Machine Encryption Security & Compliance in the Cloud

Securing Your Most Sensitive Data

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Understand & Prepare for EU GDPR Requirements

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Mapping BeyondTrust Solutions to

THE SECURITY LEADER S GUIDE TO SSO

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

HIPAA Regulatory Compliance

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Altitude Software. Data Protection Heading 2018

locuz.com SOC Services

5 OAuth Essentials for API Access Control

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Cloud Customer Architecture for Securing Workloads on Cloud Services

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

News and Updates June 1, 2017

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

DigitalPersona for Healthcare Organizations

Evolved Backup and Recovery for the Enterprise

CA Security Management

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Mobile Data Security Essentials for Your Changing, Growing Workforce

SAP Security in a Hybrid World. Kiran Kola

Next Generation Authentication

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

Cloud Access Manager Overview

MEETING ISO STANDARDS

Pulseway Security White Paper

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Secure Access & SWIFT Customer Security Controls Framework

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

HIPAA Compliance discussion

Closing the Biggest Security Hole in Web Application Delivery

Transforming Security Part 2: From the Device to the Data Center

Hybrid Identity de paraplu in de cloud

The Modern Web Access Management Platform from on-premises to the Cloud

Yubico with Centrify for Mac - Deployment Guide

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

SYMANTEC DATA CENTER SECURITY

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Oracle Buys Automated Applications Controls Leader LogicalApps

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Managing Microsoft 365 Identity and Access

Google Identity Services for work

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

Service Description VMware Workspace ONE

white paper SMS Authentication: 10 Things to Know Before You Buy

Combating Cyber Risk in the Supply Chain

Securing Office 365 with SecureCloud

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Secure Access for Microsoft Office 365 & SaaS Applications

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Village Software. Security Assessment Report

IBM Security Access Manager

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

SECURITY & PRIVACY DOCUMENTATION

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Safelayer's Adaptive Authentication: Increased security through context information

Identity-Powered Security

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Safeguarding Privileged Access. Implementing ISO/IEC Security Controls with the CyberArk Solution

Best Practices in Securing a Multicloud World

Maximize your move to Microsoft in the cloud

Crash course in Azure Active Directory

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Transcription:

GDPR How we can help Solvit Networks 01.11.2017 2016 CA. ALL RIGHTS RESERVED.

GDPR The facts The General Data Protection Regulation (GDPR) applies to all companies trading in the EU and processing personal data of EU Residents GDPR comes to effect on 25 th May 2018 Sanctions of up to 20,000,000 or 4% of annual worldwide turnover GDPR is not a best practice it is a privacy regulation 2016 CA. ALL RIGHTS RESERVED.

GDPR Who is affected Public sector Financial sector Healthcare Industry sector Retailers Telco sector Cloud providers Transport sector Marketing sector 2016 CA. ALL RIGHTS RESERVED.

GDPR - Changes NEW REQUIREMENTS NEW USERRIGHTS TECHNOLOGY STRATEGY STRONG IDENTITY Data protection by design/default Data protection impact assessments Data breach notification Right to be forgotten/erasure Where your data is, how you collect it, and who can touch it Strong, identity policies and tools for authorization and authentication to ensure ccompliance Data protection officers - DPO 2016 CA. ALL RIGHTS RESERVED.

GDPR CONTROL ACCESS CONTROL DATA Trusted Digital Relations hip Suite USERS RESOURCES Customers Partners Employees & Administrators Manage Identity Relationships & Lifecycle Know the User Productivity Connectivity Privacy Transparency Mobile Web API Cloud Services On Premise Apps Things Systems Data

HOW CAN WE HELP YOU WITH GDPR Perform detailed analysis Create a good and achievable plan Redesign your processes Implement technology GAP ANALYSIS RISK ANALYSIS PROJECT PLANNING DATA PROTECTION 2016 CA. ALL RIGHTS RESERVED.

CA Solutions for GDPR Identity and governance management Privileged access management Advanced authentication Single Sign On API Management 2016 CA. ALL RIGHTS RESERVED.

CA Identity Management & Governance

Identity The right people (and devices) to secure applications Employees Partners Laptop Mobile Devices Mobile App have the right access API Cloud applications Consumer Desktop Identity Web Browser Big Data Environments Developers 9 Administrators On-premise Delivered via: Hybrid Cloud On-premise applications

Demands of the Business User Unified interface Support my device Productivity Business friendly Decision support tools Customized experience 10 2016 CA. ALL RIGHTS RESERVED.

But, the IT user has needs too! Fast provisioning Policy enforcement Fast ROI Low TCO Application connectivity Compliance reporting & auditing 11 2016 CA. ALL RIGHTS RESERVED.

CA Identity Suite Designed with your IT & Business needs in mind Capabilities IT Access Governance Privilege Cleanup Risk Analysis Performance Analytics Deployment Tools Business Deep Provisioning Access Requests Certifications One-stop shop for Identity Self-Service 12 2016 CA. ALL RIGHTS RESERVED.

Convenient, intuitive, business-oriented user experience A One-Stop Shop for business user access to all identity services User experience that is specifically designed for business. Uses terms that business users understand. Business-oriented proactive analytical & advisory tools Personalized dashboards Business-oriented resource names 13 2016 CA. ALL RIGHTS RESERVED.

Automated Provisioning Wizard-based on-boarding of new users (including self-registration), such as employees, business partners and contractors. Manages identities, roles, and policies across on-premises & cloud applications Customizable workflows support the unique way each organization approves, and schedules these activities. Broad set of connectors to target systems 14 2016 CA. ALL RIGHTS RESERVED.

Access Requests Easy-to-use access request process through an intuitive 'Shopping Cart experience. Conveniently request roles and entitlements from a Business Entitlements Catalogue Advice Tools such as real-time context-based access recommendations All requests can be checked for segregation of duties compliance. 15 2016 CA. ALL RIGHTS RESERVED.

Certification Campaigns Simplifies and centralizes all necessary compliance activities in one place. Business entitlements catalogue simplifies certifications Risk analysis highlights risky access to: Enable real-time remediation Improve policy enforcement Simplify regulatory compliance. Easily customizable for the needs of each role/user CRM Customer view View Billing Reports Update HR reports 16 2016 CA. ALL RIGHTS RESERVED.

CA Privileged Access Management

But the reality is attacks using privileged accounts ever CYBERCRIME Target 70 million credit cards stolen Home Depot 56 million credit cards stolen JP Morgan Chase 76 million account records stolen CYBERESPIONAGE Anthem 80 million personal records stolen Forbes.com and unidentified health insurer targeted (defense contractors, government workers) information gathering of individual data BUSINESS IMPACT CodeSpaces forced out of business Sony Pictures extensive disruption German Steel Mill physical damage Saudi Aramco physical systems damage and business disruption 18 18 2016 CA. ALL RIGHTS RESERVED.

Privilege: Core of the Breach Kill Chain Threat Actor Network Perimeter EXTERNAL THREATS C&C, Data/IP Exfiltration Gain/Expand Access Elevate Privilege Wreak Havoc Trusted Insider Lateral Movement, Reconnaissance INTERNAL THREATS 19 2016 CA. ALL RIGHTS RESERVED.

The Problem is Getting Worse Increased Overhead; Growing Risk On Premise VMware Administrator Microsoft Office 365 Administrator Employees/Partners Systems Admins Network Admins DB Admins Application Admins Apps AWS Administrator Public Cloud Employees Systems/NW/DB/Applicati on Admins INTERNET Partners Systems/NW/DB/Application Admins Hacker Malware/APT Apps 20 2016 CA. ALL RIGHTS RESERVED.

Credential Safe Authentication Access Control Monitoring, Alerting & Intervention CA PAM Key Capabilities >Privileged credentials >SSH Session Keys >FIPS 140-2 Level 1 & 2 compliant encryption >Optional HSM for FIPS 140-2 Level 3 support > Application-to- Application Support >Industry s broadest platform support >Active Directory & LDAP > RADIUS integration >PKI/X.509 & Smartcard (PIV/CAC) support >Multi-factor authentication (CA Technologies, RSA, VASCO, SafeNet, Entrust, etc) >Privileged user SSO >Federated Identity & attribution >Role-based privileged user access limits >Zero Trust deny all, permit by exception policy engine >Continuous monitoring & logging >DVR-like session recording >Command filtering >Leapfrog prevention >Proactive policy violation prevention 21 2016 CA. ALL RIGHTS RESERVED.

Ovum Decision Matrix: Selecting a Privileged Identity Management Solution, November 2015 22 2016 CA. ALL RIGHTS RESERVED.

CA Advanced Authentication

Why Breaches Are Occurring Passwords, identities and breaches Passwords are created by humans Authentication is needed for multiple applications Enormous number and type of users Passwords are valuable to fraudsters Getting ahold of a password, the digital world is open to them Traditional credentials are not enough! Year after year, cyber threats continue to increase in both sophistication and frequency. Many of the attacks involve compromised user names and passwords. 24 2016 CA. ALL RIGHTS RESERVED.

What Organizations Must Do to Protect Themselves The average total cost of a data breach for the participating companies increased 23 percent over the past two years to $3.79 million* *IBM and Ponemon Institute, 2015 Cost of Data Breach Study: Global Analysis. How to get protected Protect user identity from online attacks Provide security for mobile devices Secure privileged identities Use best practice Intelligent Authentication methods (MF and RISK based authentication) 25 2016 CA. ALL RIGHTS RESERVED.

Business Decisions for More Effective Authentication Convenience Security Enterprises will select their password replacement / password enhancing technology based on three criteria. Costs Security Convenience 26 2015 CA. ALL RIGHTS RESERVED.

What if you could Authenticate User with Simple Password Analyze Risk on Behavior, Device and Location Initiate Step-Up Authentication when Risk is High From a Single Authentication Solution? 27 2016 CA. ALL RIGHTS RESERVED.

CA Advanced Authentication - Product Overview Business Problems Addressed Providing greater identity assurance Detecting anomalous user behavior Dynamic risk assessment Forcing additional proofing of identity when elevated risk is detected Reduces the need for additional proofing when the user is recognized Key Capabilities Multi-factor and step-up authentication with Risk assessment Policy enforced using rules, contextual information, and behavioral analytics Integration with CA SSO, PAM and APIM solutions Open white box rules engine 28 2016 CA. ALL RIGHTS RESERVED.

CA Advanced Authentication - Product Overview Two best-of-breed components that can be deployed individually or together: CA Risk Authentication TM CA Strong Authentication TM WHERE IS THE USER? CA AUTH ID CA MOBILE OTP WHAT DEVICE IS BEING USED? Contextual Authentication Versatile Authentication Q&A WHAT IS THE USER TRYING TO DO? OATH TOKENS IS THE ACTION CONSISTENT WITH HISTORY? OTP OUT OF BAND 29 2016 CA. ALL RIGHTS RESERVED. 2

Risk Assessment is a Strong Credential AVAILABLE RISK DATA? Where is the user? What device is being used? What is the user trying to do? Is the action consistent with history? LOCATION DEVICE DNA TM BEHAVIOR HISTORY Is the location inherently suspect? Have they been there before? Where were they recently? What kind of device is it? Have they used it before? Has it changed since they last it? Is this a typical action for the user? Is the action inherently risky? Have they taken similar actions before? Is this a normal time of day for them? Is their frequency of login abnormal? Is this action consistent with prior actions? 30 2016 CA. ALL RIGHTS RESERVED.

CA Single Sign On (CA SSO)

When Users Have Multiple Identities, There Are User and Administrative Costs End User Administrator Users are continually asked to present their online identity again and again. Administrators have to create access policies in parallel for every user identity. 32 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

...SSO & Flexible Access Management is Business Critical to the Open Enterprise YOUR USERS YOUR APPLICATIONS Contractors SaaS Partners CA SINGLE SIGN-ON Cloud Apps/Platforms & Web Services Employees Customers Centralized solution value = Fewer logins Lower TCO 33 2017 CA. ALL RIGHTS RESERVED. Less time to deployment Enterprise Apps On-Premise Lower risk of security policy gaps

Typical CA SSO environment 34 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

CA Single Sign-On - Product Overview Business Problems Addressed Controlling access to various information resources Reducing costs of managing access Better user experience Raising end user productivity Key Capabilities Centralized session management Flexible architecture models Identity federation Policy-based authorization Social login support Comprehensive access audit 35 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

Flexible Architectures for Different Needs in a Single Deployment Open Federation Standards SOAP and REST APIs Policy Enforcement Connectors (Agents) CA Single Sign-On Policy Enforcement Gateway 36 Open Format Cookie 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

Social Media Drives New Requirements Increases sign up rate. Collect identity attributes allows for immediate personalized marketing. Increase customer engagement by eliminating multiple logins. 37 Sign in with stronger credentials when needed for high value transactions 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

Requirements Beyond Basic SSO User Resources Administrator Separate SSO zones Password policies Session replay prevention Session timeouts Single log out Centralized audit Scoped/delegated administration Directory mapping Attribute-based authorization Step up authentication Integrated multi-factor authentication Integrated risk-based authentication Risk-based authorization 38 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. Please note that this presentation is for your informational purposes only does not serve as any technical user guides or documentation. There is no direct or indirect warranty provided pertaining the products and actual use may vary from the illustrations provided.

Thank you! Solvit Networks 2016 CA. ALL RIGHTS RESERVED.