Identity Management as a Service

Similar documents
Next Generation Authentication

Cloud Security: Constant Innovation

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Cloud Security. Presented by Richard Brown

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Crash course in Azure Active Directory

Who s Protecting Your Keys? August 2018

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

How Next Generation Trusted Identities Can Help Transform Your Business

Virtual Machine Encryption Security & Compliance in the Cloud

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Five Reasons It s Time For Secure Single Sign-On

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

DigitalPersona for Healthcare Organizations

Strong Security Elements for IoT Manufacturing

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Dissecting NIST Digital Identity Guidelines

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Certificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between

THE SECURITY LEADER S GUIDE TO SSO

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Mobile: Purely a Powerful Platform; Or Panacea?

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

The security challenge in a mobile world

Go mobile. Stay in control.

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

IBM Future of Work Forum

The Device Has Left the Building

Transforming the Document Signing Process

Using Biometric Authentication to Elevate Enterprise Security

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

Simplify Application Access with Azure Active Directory

HIPAA Regulatory Compliance

Google Identity Services for work

Canadian Access Federation: Trust Assertion Document (TAD)

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Keep the Door Open for Users and Closed to Hackers

Identity as the core of enterprise mobility

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

Next Generation Privilege Identity Management

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Indeed Card Management Smart card lifecycle management system

Security Solutions for Mobile Users in the Workplace

New Paradigms of Digital Identity:

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools

CipherCloud CASB+ Connector for ServiceNow

Single Secure Credential to Access Facilities and IT Resources

Enterprise Mobility Management: completing the EMM story

Canadian Access Federation: Trust Assertion Document (TAD)

Cracking the Access Management Code for Your Business

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Bring Your Own Device Policy

Safelayer's Adaptive Authentication: Increased security through context information

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Keynote: The Future of Data Leakage Prevention

Cloud Customer Architecture for Securing Workloads on Cloud Services

Applying biometric authentication to physical access control systems

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Integrated Access Management Solutions. Access Televentures

THE IDENTITY DEFINED SECURITY ALLIANCE

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Yubico with Centrify for Mac - Deployment Guide

Authentication Technology for a Smart eid Infrastructure.

Are You Flirting with Risk?

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Understand & Prepare for EU GDPR Requirements

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

PKI is Alive and Well: The Symantec Managed PKI Service

Accelerating growth and digital adoption with seamless identity trust

white paper SMS Authentication: 10 Things to Know Before You Buy

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

MaaS360 Secure Productivity Suite

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Secure & Unified Identity

Managing Microsoft 365 Identity and Access

CONNX SECURITY OVERVIEW

Transforming Security Part 2: From the Device to the Data Center

A comprehensive security solution for enhanced mobility and productivity

1 The intersection of IAM and the cloud

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ARUBA CLEARPASS NETWORK ACCESS CONTROL

Transcription:

Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by those connections is a challenge to manage. Managing it all in one place and sharing this data across typically siloed systems presents a challenge and an opportunity to do more, with less. Our systems are no longer only on our physical premises, but in the cloud and accessible via the internet and they are accessed by many devices any time, day or night from anywhere in the world. They are accessed not only by employees but contractors, customers and partners. Our Jellyfish IdMaaS Solution The Jellyfish solution is modular. It is designed as an integrated cohesive stack that is purpose-built to handle complexity. This is not a set and forget solution, it s organic and will grow with your security requirements. Jellyfish is a simple, cost-effective, low risk complete solution for connecting identities such as users, devices and services to each other. Cogito Group s Jellyfish is a complete and integrated cyber security platform. Manage your users, credentials, devices and access through: o Enhanced security and sensor fusion o Better visibility o Simplified and central control Improve end user productivity through: o Seamless authentication o Automation Reduce your administration burden Enables cost reductions To balance security, usability and cost effectiveness, Cogito Group has developed a customisable modular approach to identity management. Jellyfish allows components to be added or removed based on an organisation s security requirements. ---------------------------- Cogito s Jellyfish IdMaaS Solution Secure Adaptable Integrated Simple Modular Highly scalable Cost-effective --------------------------------- Enhance your security through: Increased visibility Greater control

Benefits o Automate changes across your network Self-service Add and remove resources from a single point across multiple applications and services Offers the cost benefits of a cloud service Improves productivity of resources Improves transparency through monitoring, auditing, reporting of security breaches Highly scalable through a customised modular approach Jellyfish provides a single access interface for: IdM Identity management with CRUD operations, data transformation between source and target systems for users and resources and configurable workflows. IdAM Access management service is also able to provide integration with logical and physical access control systems (including integration with legacy systems) through adaptive support for modern authentication protocols as well as emerging standards and multifactor authentication. This ensures access to systems and building areas can seamlessly be added and removed as people join, move within or leave an organisation through existing HR functions. MDM The ability exists to manage Mobile Enterprise and BYOD devices from within the system as well as to use these devices as one factor in secure multifactor authentication. Credential Management Credential management services provides administrators with the ability to issue and manage certificates, smartcards, and OTP tokens. An Auto-enrolment capability is also provided. Layers of Security Identity Management Our Identity Management solutions provide strong authentication to ensure users and devices accessing your network are who they claim to be. Identity and Access Management (IdAM) applications such as network authentication, digital signatures and other services based on Public Key Infrastructure (PKI). Identity Management systems provide the basis for the collection, management and synchronisation of identity information and attributes between disparate systems. These systems reduce the effort and cost of the management of data by managing the identity data throughout its lifecycle. Identity Management systems provide workflow for the automation of access to systems and services either by an approval process or based on identity attributes.

Access Management Our access management solution empower organisations in providing integrated physical access to the building and logical access to ICT systems and data along with web based access to services. Making the logical connection of Human Resource (HR) workflows (commencing employment, termination, transition) and the access workflows to both physical access (building); logical access (ICT) systems and Web SSO. Access Management is based on the known and assured identity Mobile Device Management Our Mobile Device Management solution enables operators to remotely manage the entire life cycle of a device, significantly reducing support costs, considerably increasing data revenue, and maximising customer satisfaction. Giving customers, fast and simple online authentication with a convenient single ID password. In addition, it protects privacy and reinforces online security. Credential Management Our card/credential Management solutions manage the association between an identity and their issued credentials. They manage the lifecycle of trusted tokens such as smart cards and now provide capabilities for the management of virtual smart cards and credentials delivered to smartphones and other mobile devices. Protected Data Our Protected Data Store provides key management and protection as well as transparent encryption of structured, sensitive data residing in databases, files and file systems, storage units, directories and applications. These security products provide protection of data in transit and at rest and are ideal for implementation in physical, virtual or cloud environments. Monitor Our solutions are capable of monitoring a variety of operating systems, network devices and server hardware platforms. The various components that make up your overall solution package will be monitored and may include, Microsoft products, Microsoft infrastructure services, Hardware platforms, Environmental Services, Network and Storage Devices. Audit Auditing can publish and log all relevant system activity to the targets you specify. Auditing can include data from reconciliation as a basis for reporting, access details, and activity logs that capture operations on

internal (managed) objects and external (system) objects. Auditing provides the data for all the relevant reports, including orphan account reports. Report & Analytics Our solutions applies behavioural analytics technology to providing real-time, risk-based authentication. Bad actors using good credentials to compromise an account will behave differently from the legitimate user. Our solutions will distinguish between legitimate log-in activity and unauthorised access.

About Cogito Group Cogito Group is an award winning Australian owned and operated ICT company specialising in authentication, cloud security, identity management and data protection. Cogito Group protect the authentication methods used to access information through the use of Identity and other security technologies. Cogito Group protect data not only from unauthorised access and disclosure, but also from being altered by an unauthorised third party or a trusted insider with malicious intent. This assists in the detection and prevention of fraud or other malicious activities by third parties or trusted insiders.