Secure & Unified Identity

Similar documents
Agenda. Copyright 2015 Centrify Corporation. All Rights Reserved. 1

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Microsoft Security Management

Cloud Customer Architecture for Securing Workloads on Cloud Services

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

AKAMAI CLOUD SECURITY SOLUTIONS

Copyright 2011 Trend Micro Inc.

SYMANTEC DATA CENTER SECURITY

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Phil Schwan Technical

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Session ID: CISO-W22 Session Classification: General Interest

Secure Access - Update

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Securing Data in the Cloud: Point of View

Security Readiness Assessment

Changing face of endpoint security

App Gateway Deployment Guide

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Go mobile. Stay in control.

SIEM: Five Requirements that Solve the Bigger Business Issues

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Quo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,

Who s Protecting Your Keys? August 2018

The Oracle Trust Fabric Securing the Cloud Journey

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Compliance Audit Readiness. Bob Kral Tenable Network Security

SAS and F5 integration at F5 Networks. Updates for Version 11.6

locuz.com SOC Services

the SWIFT Customer Security

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

The Etihad Journey to a Secure Cloud

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

THALES DATA THREAT REPORT

VMware Hybrid Cloud Solution

Best Practices in Securing a Multicloud World

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Why the cloud matters?

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Enterprise & Cloud Security

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Dynamic Datacenter Security Solidex, November 2009

Securing Your Virtual World Harri Kaikkonen Channel Manager

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Building a More Secure Cloud Architecture

Oracle bakes security into its DNA

PrecisionAccess Trusted Access Control

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

CSP 2017 Network Virtualisation and Security Scott McKinnon

IBM Future of Work Forum

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Transforming Security Part 2: From the Device to the Data Center

Qualys Cloud Platform

Securing Today s Mobile Workforce

Encryption Vision & Strategy

The Device Has Left the Building

Services solutions for Managed Service Providers (MSPs)

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Office 365: Modern Workplace

Secure Access & SWIFT Customer Security Controls Framework

The threat landscape is constantly

Cybersecurity Roadmap: Global Healthcare Security Architecture

What matters in Cyber Security

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

GDPR Update and ENISA guidelines

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Spotlight Report. Information Security. Presented by. Group Partner

Securing the Next Generation Data Center

Integrated Access Management Solutions. Access Televentures

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

NEXT GENERATION SECURITY OPERATIONS CENTER

Crash course in Azure Active Directory

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Google on BeyondCorp: Empowering employees with security for the cloud era

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

NEXT GENERATION CLOUD SECURITY

Simple and secure PCI DSS compliance

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

Securing Your Cloud Introduction Presentation

Identity & Access Management

Cybersecurity Auditing in an Unsecure World

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Transcription:

Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1

Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong seed that in an increasingly cloud-y and mobile-y world, many of the traditional security solutions (e.g. AV, firewall, etc.) are no longer as applicable and important In this new world order, focus should be on securing the user and their digital identity vs. securing the perimeter (as the perimeter is dissolving) vs. securing endpoints (as endpoints are not owned and can t be managed by IT organizations) Copyright 2015 Centrify Corporation. All Rights Reserved. 2

De-Perimeterization Mac Mobile SaaS IaaS Access Anywhere No physical boundaries Copyright 2015 Centrify Corporation. All Rights Reserved. 3

Key Point #2: Identity is in Fact at Core of 75% of Cyber Attacks PRIVILEGED USERS END USERS Copyright 2015 Centrify Corporation. All Rights Reserved. 4

Key Point #3: Surveys Confirm Identity is Top Priority Q: What are your top security-related projects in next 12 months? Select up to three. INFORMATION SECURITY PROJECTS Identity Management SIEM Firewall Management DLP Intrusion Management Mobile Device Management Authorization/Access Control Policy Management Log Management Keeping Up with New Technology Security Awareness Vulnerability Assessment Monitoring Improvements Encryption Application Security Web Content Filtering Data Classification PCI Compliance Data Security Cloud Computing Control VPN/Remote Access GRC Directory Services Datacenter Expansion/Consolidation Anti-DDos 3% 3% 3% 3% 3% 4% 4% 4% 4% 5% 6% 6% 6% 6% 8% 8% 8% 7% 9% 9% 10% 12% 13% 13% 14% Source: TheInfoPro (451 Research), Information Security Wave 16, 2014 Copyright 2015 Centrify Corporation. All Rights Reserved. 5

Enterprise of Things = More Complexity Desktops Mobile + Data Center Apps Cloud (SaaS) Apache by Red Hat + Data Center Servers Cloud (IaaS & PaaS) + Copyright 2015 Centrify Corporation. All Rights Reserved. 6

Making Identity Even Harder to Manage Desktops Mobile Data Center Apps Cloud (SaaS) Apache by Red Hat Data Center Servers Cloud (IaaS & PaaS) Copyright 2015 Centrify Corporation. All Rights Reserved. 7

Centrify: Unified Identity Management Desktops Mobile Data Center Apps Cloud (SaaS) Apache by Red Hat Identity Platform Data Center Servers Cloud (IaaS & PaaS) Active Directory Copyright 2015 Centrify Corporation. All Rights Reserved. 8

Identity Challenges are Major app app app User Productivity More accounts/passwords means users are less productive/secure Users want self-service for devices + apps, but hard to do given sprawl Security & Compliance Admins sharing/using more privileged accounts (e.g. local, root) = greater attack surface for APTs and insider threats Shadow IT proliferation = lack of control and visibility Islands of identity = more difficult compliance and security app app app Operational Efficiency No single pane of glass = operational inefficiencies and security risks IT wants single easy button to completely provision/de-provision users Multiple infrastructures/processes across disparate systems + apps Copyright 2015 Centrify Corporation. All Rights Reserved. 9

Centrify: Unified Identity Management Centrify Identity Service Identity-as-a-Service for SaaS, mobile and on-prem apps Fully integrated mobile device and app management Mac authentication and Group Policy management Improve SaaS and mobile app/device security Centrify Privilege Service Shared account password management Secure remote access Privileged session monitoring Mitigate risk of shared accounts and improve compliance Centrify Server Suite Consolidated identity and Active Directory bridge Privilege management Comprehensive auditing Server isolation Minimize privileged user risk and improve compliance Centrify Identity Platform Cloud-based platform for directory, authentication, MFA and policy, reporting and secure cloud store across both end users and privileged users Copyright 2015 Centrify Corporation. All Rights Reserved. 10

Centrify: Win-Win for Users + IT app app app User Productivity Self-service for devices and apps equals instant productivity Single (or zero) sign-on for all apps (SaaS or rich mobile) Security & Compliance Fewer passwords, more granular policy equals less risk Least privilege for admins/sso plus mobile policy for users Comprehensive auditing equals greater control, better compliance app app app Operational Efficiency Consolidated identity infrastructure across OS, app, device, location, etc. Lower TCO (H/W, S/W, time) and leveraging existing skillsets Faster time to provision/de-provision and faster replies to audits Copyright 2015 Centrify Corporation. All Rights Reserved. 11

Centrify: 5,000 + Customers, 97% Retention Banking & Finance Pharma & Health Defense & Government Retail & Internet Technology & Telecom Automotive & Energy Copyright 2015 Centrify Corporation. All Rights Reserved. 12

A Selection of Our EMEA Customers Copyright 2015 Centrify Corporation. All Rights Reserved. 13

Banking and Finance We ve done it before All of the customers below undertook a deep and comprehensive competitive and technical evaluation with Centrify winning on each occasion due to our technical superiority, ease of deployment and simplicity During our PoC, it was very evident that Centrify Suite is built on a common architecture and code base, whereas other solutions we tested were clearly a bunch of acquired technologies loosely glued together with the only integration points being marketing integration points! We were able to deploy and join to Active Directory up to 500 systems per night with Centrify once our architectural design was complete. During our technical evaluation and score-carding process involving 6 vendors, Centrify came top in 14 out of 15 technical score-card categories. The vendor ranked second was a considerable way behind Centrify both technically and from an ease of deployment perspective due to Centrify s unique zoning capabilities Copyright 2015 Centrify Corporation. All Rights Reserved. 14

Complete Solution Must Provide ON-PREM SaaS MOBILE End User Requirements Single sign-on Fast self-service IT Requirements Full visibility Leverage Active Directory across cloud and mobile Integrated mobile device and app management Auto-provision end user apps and devices Solution = Much bigger than just SSO for SaaS! Copyright 2015 Centrify Corporation. All Rights Reserved. 15

D A T A C E N T E R S E R V E R S N E T W O R K D E V I C E S D A T A C E N T E R A P P S Competitive Landscape Centrify is the only vendor who addresses both on-premise as well as mobile and cloud. Addressing all three is critical as the vast majority of customers identity needs will today and in the future span across all three i.e. need to be a platform vs. point solution for cloud or mobile DATA CENTER CLOUD MOBILE Partial overlap with MDM Open Source Utilities Copyright 2015 Centrify Corporation. All Rights Reserved. 16

Centrify Summary Addresses one of the biggest IT problems in moving to cloud and BYOD Optimizing user productivity while enabling IT to control who can access what from which device Unique portfolio that unifies identity across cloud, mobile and data center for end and privileged users 10-year company with over 400 personnel, global sales, and support Trusted technology Deployed by 5,000+ customers with 97% retention rate including ~50% of Fortune 50 Strategic alliances with Microsoft, Apple, AVG and Samsung and 250+ resellers Industry Awards Industry Certifications Copyright 2015 Centrify Corporation. All Rights Reserved. 17

115093, Москва, Партийный пер., д.1, к.46 Тел.: +7 495 767-16-19 www.itgrd.ru Copyright 2015 Centrify Corporation. All Rights Reserved. 18