3

One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity

One Identity Fall updateMartin Scherrer

Business Development Manager

Page 2: One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity

One Identity - Restricted - Confidential2

Get Identity and Access Management Right

Identity as a service

Privileged account management

Access Management

Password management

AD management and security

AD bridge

Multifactor auth.

Root delegation

Secure remote access

Enterprise SSO

Vaulting/sessions

Enterprise provisioningAccess governance

Data governance

Privileged account governance

WAM

Adaptive security

Cloud provisioning and governance TFA

Analytics

Identity governance

Page 3: One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity

One Identity - Restricted - Confidential3

Our focus areasIdentity Governance

How can I control and obtain a comprehensive view of my entire environment?

• Govern data access & enable employees to work from anywhere

• Control data dissemination only to authorized users

• Meet the challenge of achieving compliance in the cloud

• Unify access management• Secure and manage access to

any browser-based application • Secure access to internal

resources by remote and mobile users

• Reduce complexity and optimize your environment whether your identities are on-premises, in virtualized environments or in the cloud

Access ManagementHow can I understand who is

accessing the cloud from anywhere, at anytime?

• Transfer data and workloads to the cloud, but not liability

• Regain some level of control over the cloud and your data

• Detect breaches earlier with identity intelligence and user access behavior analysis

Privileged Management How can I monitor and control

a prime source of security breaches?

Page 4: One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity

One Identity - Restricted - Confidential4

On -prem SaaS For all access scenarios

For all user types

Privileged Management

The scope

Access Management

Identity Governance

Ensure that all users can get the resources they need to do their jobs from any location and any device in a convenient, secure and compliant manner.

Achieve complete, business-driven governance for identities, data and privileged access by marrying visibility and control with administration.

Centrally manage privileged accounts with individual accountability through granular control and monitoring of administrator access.

Page 5: One Identity Fall update · 4 One Identity -Restricted -Confidential On -prem SaaS For all access scenarios For all user types Privileged Management The scope Access Management Identity