1 / 16

StealthAUDIT

StealthAUDIT. For Access & Data Governance. STEALTHbits Technologies. Strong Management Team. Access & Data Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies

seant
Download Presentation

StealthAUDIT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. StealthAUDIT For Access & Data Governance

  2. STEALTHbits Technologies StrongManagement Team Access & Data Governance Expertise Strong & Growing Customer Base • Purpose-built automation platform • Infrastructure-independent • Enterprise-Scale & Grade • Patented Technologies • Strong references & deployments • 7 of the top 10 Financial services firms • 3 of the top 5 Property insurance firms • 2 of the top 5 Pharmacy Service firms • Top 2 Telecommunications firms Strong Partner Ecosystem

  3. Business Challenges Data Explosion • 80% of Data is Unstructured • 650% increase over 5 years (Gartner) • Cloud, Mobility, Virtualization & Social Access Sprawl • Constant Change • Over-Provisioning • Decentralized Management Active Directory • Critical Infrastructure • Highly Distributed • Limited Oversight • Organic Growth / M&A • Group Proliferation Rising Risk Exposure • Increasing Threat Landscape • Tightening Regulatory Requirements • Brand/Revenue Impact

  4. Business Impact Risk & Security • Identify Policy Violations • Eliminate Over-Provisioning • Enable Least-Privilege • SOD Issues Operational Efficiency • Simplified On-boarding • Toxic ConditionsToken Bloat / Group Hygiene • Access Investigation • Enable Technology Adoption Audit & Compliance • Ability to Respond • Audit Findings • Time, Cost, & Effort

  5. Leverage Existing Investment in IAM SILOS

  6. StealthAUDITfor Access & Data Governance

  7. Discover Active Directory Discover Operational Risk • Stale / Unused Objects • Group Nesting Issues • Cross-Domain Issues • Incomplete Information • Token Size Issues Discover Security Risk • User Accounts & Attributes • Groups & Memberships • Security Policies • Anomalies Prioritize & Remediate Active Directory Context DB

  8. Discover Data Environment File Systems Permission Sprawl • Who Has Access to What? • Who is Accessing What? • How are Rights Applied? High Risk Repositories • Open, Sensitive Stores Data Ownership • Permissions, Activity, Content.. • Shares/Folders/Files… Content Analysis • Stale, Sensitive, Unused • Content violations Prioritize & Remediate SharePoint Email Databases Other AD-Enabled Resources ADCD PDB Virtual Entitlements Store

  9. Prioritize Risk Exposure File Systems Roadmap to Resolution • Executive Dashboard & Drill Down Reports • Visibility into Active Directory and Various Data Sources • Analyze Permission Assignments • Identify Ownership • Remediation Modeling • Weighted Risk Analysis ActiveDirectory SharePoint Email Databases ADCD PDB Other AD-Enabled Resources Virtual Entitlements Store

  10. Remediate High-Risk Conditions Access & Data Diligence • Visibility Across the Microsoft Ecosystem • Discover Operational & Security Risk • Prioritize & Remediate • Continuous Monitoring • Automate & Integrate • Transform Security Model to Support Future Expansion Identify Risk Transform Automate ReviewEntitlements Continuous Monitoring ADCD PDB Virtual Entitlements Store

  11. Integrate with IAM Solutions Active Directory Forests & Domains ISIM File Systems Databases SharePoint PDB ADCD Virtual Entitlements Store Applications

  12. Self-Service Data Governance for ISIM • STEALTHbits identifies the unstructured data resources and introduces them into the ISIM workflows without user intervention. Resource risk profiles ensure optimal data protection. • When an access request is made, STEALTHbits identifies the appropriate resourcesteward to approve or deny the request. • ISIM requires the security group that should be used to grant permissions. The application of security groups is typically unmanaged and unpredictable. STEALTHbits eliminates the confusion and identifies the appropriate groups for each level of access. • STEALTHbits automatically feeds the requisite intelligence into ISIM and maintains that information over time.

  13. Self-Service Data Governance for ISIM Your Value: • Gain full visibility across unstructured data • Fill access and permissions gaps • Reducing risk and meeting compliance requirements • Meeting customer security audit requirements • Automated provisioning and de-provisioning via ISIM/ITIM

  14. Self-Service Data Governance for ISIM Customer Value: • Gain full visibility across unstructured data • Fill access and permissions gaps • Reducing risk and meeting compliance requirements • Meeting customer security audit requirements • Automated provisioning and de-provisioning via ISIM/ITIM Your Value: • Gives you a competitive edge • Better understanding of your customer’s business • Improve customer relationships • Increased deal value = increased revenue • Upsell opportunities with existing customers

  15. Summary • Leverage existing ISIM/ITIM technology • Extend your visibility into unstructured data • Extended self-service requests of access to organizational resources • Fulfill audit requirements • Improved security posture • Eliminates the blind spot in IAM & IAG

  16. Questions?

More Related