IBM Security Systems Identity Management And Session Recording

IBM Security Systems Identity Management And Session Recording A Partnership with IBM and ObserveIT 1 2013 IBM Corporation 2013 IBM Corporation IBM Security Systems Agenda Session Recording What does ObserveIT offer? How does it compare with Cyberark and Balabit?

What customers use ObserveIT? Where can you get more information? IBM Security Privileged Identity Management Value Proposition How ObserveIT can complement ISPIM 2 2013 IBM Corporation IBM Security Systems What does ObserveIT offer? 3 2013 IBM Corporation

IBM Security Systems What does ObserveIT offer? 4 2013 IBM Corporation IBM Security Systems What does ObserveIT offer? 5 2013 IBM Corporation IBM Security Systems What does ObserveIT offer?

6 2013 IBM Corporation IBM Security Systems What does ObserveIT offer? 7 2013 IBM Corporation IBM Security Systems How does it compare with Cyberark and Balabit? ObserveIT provides a unique approach over these competitors. Key differences are: It does not require a gateway appliance to be installed to route the user sessions through; enabling a more complete capture of user sessions

Session recording are indexed and tagged; enabling faster search time ObserveIT: Video capture + text audit log analysis of user sessions ObserveIT gives you much more intelligence, by generating a detailed metadata log of all user activity. (Apps launched, file names, URLs, window titles, system calls, resources affected etc.) This table-of-contents for each session allows you to quickly see the scope of each session at a glance and search for relevant sessions, without the need to replay the entire video. 8 ObserveIT: Can be deployed on each user desktop, and can be deployed in VMs and published applications.

Many security audits also require that desktop activity be monitored for sensitive business apps (ex: SAP, Salesforce), especially when the logs of these apps are not sufficient to show exactly what users did. 2013 IBM Corporation IBM Security Systems What customers use ObserveIT? 9 2013 IBM Corporation IBM Security Systems Where can you get more information?

ObserveIT Web Site (http://www.observeit-sys.com/) IBM DeveloperWorks (Ready for IBM Security Intelligence Community) (https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/ W84d0964e6911_4d3b_a883_3de19eb0b2a6/page/Information%20on%20ObserveIT? lang=en) 10 2013 IBM Corporation IBM Security Systems IBM Security Privileged Identity Manager 11 2013 IBM Corporation

IBM Security Systems IBM Security Privileged Identity Manager Overview Centrally manage, audit and control shared identities across the enterprise Key solution highlights Control shared access to sensitive UserIDs Check-in / check-out using secure credential vault IBM Security Privileged Identity Manager Request, approve and re-validate privileged access Reduce risk, enhance compliance Track usage of shared identities Provide accountability Admin Admin ID

ID Databases Automated password management Automated checkout of IDs, hide password from requesting employee, automate password reset to eliminate password theft IBM security solution IBMs Privileged Identity Management (PIM) solution providing complete identity management and enterprise single sign-on capabilities for privileged users 12 2013 IBM Corporation IBM Security Systems

Value proposition: IBM provides a comprehensive solution to securely control privileged identity use Control Control Shared Shared Access Access Approve, Approve, Revalidate Revalidate Privileged Privileged IDs IDs && Shared Shared ID ID Pools Pools Monitor Monitor and

and Track Track Usage Usage Automate Automate Single Single Sign Sign On On and and password password management management Capability 13 Benefit

Centralize Privileged ID management Improves IT governance and reduces risk Securely share privileged identities Avoids the high cost of identity proliferation Automate sign on and check-in/out with strong authentication support Increases security Wide variety of out-of-the-box adapters and preconfigured access profiles Improves time to value

Full Identity Management and Enterprise Single Sign on capabilities Provides comprehensive solution for privileged users Easily expand existing IBM IAM environments to add PIM Common identity infrastructure for privileged and non-privileged users reduces operations costs 2013 IBM Corporation IBM Security Systems ObserveIT and IBM combined provide a powerful privileged identity management solution IBM Security Privileged Identity Manager provides:

Secure approach for sharing privileged identities Automated single signon for privileged users Policy-based privileged identity governance Integrated with IBMs award winning Identity and Access Management technologies IBM Security Systems ObserveIT supplements the IBM solution and provides an even stronger level of governance by adding: Robust session recording capabilities Recording archive with advanced search capabilities Addresses requirements for privileged user activity tracking 14 2013 IBM Corporation

IBM Security Systems ibm.com/security 15 2013 IBM Corporation

Recently Viewed Presentations

  • Fracking and Health: What the Internist Needs to

    Fracking and Health: What the Internist Needs to

    Enclose points where dust is released. Install thick plastic stilling or staging curtains around the bottom sides of the sand movers to limit dusts released from belt operation. Enclosures can also be added along and at the ends of the...
  • 2010/11 Pre Fire Season Aviation Briefing Welcome and

    2010/11 Pre Fire Season Aviation Briefing Welcome and

    Can self deploy to HVP estate and must call SAD on departure to establish who flight following carried by - Hancock's # 1 priority. At 60 mins - must request transfer to CFA or DSE IMT or return to base...
  • The Effect of Telmisartan and Lerkanidipine on Blood Pressure ...

    The Effect of Telmisartan and Lerkanidipine on Blood Pressure ...

    Times New Roman Arial Arial Unicode MS Comic Sans MS Wingdings MS Pゴシック Verdana Garamond-Bold Garamond Monotype Sorts Παλμός Προεπιλεγμένη σχεδίαση Γράφημα του Microsoft Graph 2000 Adobe Photoshop Image Bitmap Image 3ο Ετήσιο Μετεκπαιδευτικό Σεμινάριο Υγρών ...
  • Firstfind.org is an online library of resources that

    Firstfind.org is an online library of resources that

    There are lots of links to specific Learning Express Library courses, and lots of links to specific topics in the Khan Academy. There is a quiz at the end of each topic to check if a student has mastered the...
  • Who are Lemuel Hayes and Peter Salem?

    Who are Lemuel Hayes and Peter Salem?

    He was inspired by America's fight for independence and went to help, despite the restriction by King Louis XIV. Others came to help including Pilaski, von Steuben and de Miralles (page 173) Money Problems. ... Who are Lemuel Hayes and...
  • Forensic Serology - Madison Public Schools

    Forensic Serology - Madison Public Schools

    Forensic Serology YouTube - The Sam Sheppard case Introduction 1901- Karl Landsteiner recognized that human blood was distinguishable by its group or type Bloodstains are often found at crime scenes (homicides, assaults, rapes, etc.) Blood Factors (like A-B-O, Rh factor,...
  • 22C:19 Discrete Math

    22C:19 Discrete Math

    A cut vertex (or articulation point ) is a vertex, by removing. which one can partition the graph. A cut edge is an edge by removing which one can partition the graph. If multiple edges need to be remove to...
  • Verb Tense, Mood, and Voice - WFISD

    Verb Tense, Mood, and Voice - WFISD

    Verb tense. Verb tense needs to stay consistent. Oftentimes, this means looking before and after the marked sentence to ensure consistency. Processes, routines, and universal truths are written in present tense. Literature is timeless and written in literary present. Interrupted...