21
Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters mostidentities, applications, and data Roland Petersen International (EMEA & LATAM) Presales Director Security, Risk & Governance

Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Security, Risk, and GovernanceTake a holistic, analytics-driven approach to securing what matters most—identities, applications, and data

Roland Petersen

International (EMEA & LATAM) Presales Director – Security, Risk & Governance

Page 2: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

What a difference a year makes!

2

Page 3: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Boardroom Agenda

Cybersecurity

Risk management

Corporate governance

Industry regulations

Market cap

OpEx & sales

Customer service

DevOps & IT Ops

Human resources

Investor confidence

3

Page 4: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Security Risk Governance

Domains merging to address concerns

Security, Risk,

& GovernanceSecurity Risk Governance

4

Page 5: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Cyber damages continue to outpace spend ▪ Looking ahead over the next 5 years

CSO online: Top 5 cybersecurity facts, figures and statistics for 2018

Cyber damages to

hit $6 trillion

annually by 2021

Up from $3 trillion

in 2015

Cyber security

spending to

exceed $1 trillion

from 2017 to 2021

Cyber crime will

more than triple the

number of unfilled

security jobs

Predicted to reach

3.5 million by 2021

Human attack

surface to reach

6 billion people

by 2022

Ransomware

damage costs are

predicted to reach

$11.5 billion

by 2019

5

Page 6: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Securing people and their data was simpler once

Page 7: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

But has moved to a new level of complexity!

Data

Applications

Identities

7

Page 8: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Point solutions only address narrow problems

8

Page 9: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

How does Micro Focussolve for these challenges?

Page 10: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

17

Security, Risk, & GovernanceMicro Focus Portfolio

DATA GOVERNANCE & PROTECTION

APPLICATION SECURITY

IDENTITY & ACCESS MANAGEMENT ENDPOINT SECURITY

SECURITY OPERATIONS

INFORMATION ARCHIVING

ANALYTICS & MACHINE LEARNING

Page 11: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

20

Security, Risk, & GovernanceMicro Focus Portfolio

IDENTITY & ACCESS MANAGEMENT

Govern who has access to what and how they’re using it

NetIQ

▪ Adaptive identity governance

▪ Identity life-cycle management

▪ Identity synchronization and reconciliation

▪ Centralized role management

▪ Frictionless authentication

▪ Advanced authentication methods

▪ User self-service portal

▪ Privileged identity management

▪ File integrity, configuration, and change

monitoring

Host Connectivity

▪ Manage access to host-based applications

Page 12: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

GenLan – Micro Focus Gold Partner

Sebastijan ŠefTechnical Manager, Head of Development

21

Page 13: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

IAM Use Case 1

Main drivers for IAM project

• Improve security

• GDPR compliance

• Eliminate manual processes

• Implement and streamline authorization

workflows

• Single sign-on

• Support the roll out of apps to sea-based and

land-based employees

Page 14: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

23

Applications

Self-Service

Page 15: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

24

IAM Use Case 2

Felles (Common)

Fylkeskommunale (County)

INTegrasjoner (Integrations)

Source

system 1

Source

system 2

Adapter Adapter

Co

mm

on

com

po

ne

nts

API

Provider Interface

Information

model

Application with access

https://www.fintlabs.no/

Page 16: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

25

Fine.

So where does Micro Focus comes into play?

Page 17: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

26

Access control

Page 18: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

27

Micro Focus Access Management

Co

mm

on

com

po

ne

nts

Client

API1

Information model

Client

API2

Adapter

API1

Adapter

API2

Adapter

APIx

Client

APIx

Applications with access Source systems

Page 19: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

28

Micro Focus Access Management

Co

mm

on

com

po

ne

nts

Client

API1

Information model

Client

API2

Adapter

API1

Adapter

API2

Adapter

APIx

Client

APIx

Page 20: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Manage Identities

Secure Applications

ProtectData

by governing privileges,

enforcing access controls,

& unifying identity stores.

by embedding strong

security and best practices

into DevOps processes.

by discovering where it is,

determining who has

access, and guarding it

wherever it resides.

Micro Focus Helps You:

33

Page 21: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland

Thank you.www.microfocus.com