SlideShare a Scribd company logo
Reigning in the Cloud:
Regaining control of your Hybrid Cloud
environment
Gary Ardito
Chief Architect, Cloud Service Provider Solutions
Gary.Ardito@NetIQ.com
© 2012 NetIQ Corporation. All rights reserved.2
Who am I?
o 30 years solving business problems with
technology
o 15 + years as as principal architect – solutions
that matter – Fortune 500, .com, Non Profits,
Olympic Games
o Consulted on business inhibitors, technology
enablers and risk mitigation – thought
leadership to move businesses forward
o Historical leader of Identity and Access
Management Market
o Market leading products across Identity,
Access, SIEM, and Compliance
Management
o Enabling cloud adoption by powering
both service providers and enterprises
© 2012 NetIQ Corporation. All rights reserved.3
Why are we here?
o Cloud use is expanding and maturing … we are all
moving to a hybrid cloud future
o Mobile, Social, BYOD and the Internet Of Things are
all reeking havoc with our security management
o Current security management approaches are
broken
o Challenges exist for both Service Providers and
Enterprises
© 2012 NetIQ Corporation. All rights reserved.4
The Intelligent combination of internal and external resources
to deliver the right mix of cost savings, service levels and
business agility.
Start with the Hybrid Cloud
© 2012 NetIQ Corporation. All rights reserved.5
Add new computing contexts
Users are driving change.
Mobility BYOD Social IdentityCloud
Enterprise Service Provider
© 2012 NetIQ Corporation. All rights reserved.6
With new and unprecedented challenges
New, Persistent
Threats
Expanding
Computing
Environment
Business / Mission
Keeps
Moving
Staff
Stretched
Thin
Constant change & complexity results in
lack of control and visibility
© 2012 NetIQ Corporation. All rights reserved.7
How do we regain control?
 Protection: Strongly enforce access, compliance,
security and behavioral policies across all computing
domains
 Awareness: Capture activity with context for all
events across the breadth of your computing
environment
 Visibility: Provide role-specific, business level
dashboards exposing critical activity and patterns
 Action: Policy based, real-time action based on
appropriate remediation strategies
© 2012 NetIQ Corporation. All rights reserved.8
Physical Virtual Cloud
Secure
Measure
Manage
Identity, Access, and Compliance
Operational and SLA Dashboards
Migrations, DR, and Brokering
FIREWALL
INTERNAL CLOUD (on-premise) EXTERNAL CLOUD (off-premise)
Hybrid Cloud
Requires new management frameworks.
© 2012 NetIQ Corporation. All rights reserved.9
Hybrid Cloud Environment
It starts with IDENTITY
Access
Mgmt
Identity &
Context
Identity
Management
Awareness
& Visibility
© 2012 NetIQ Corporation. All rights reserved.10
Who and what interacts with the computing
environment?
What behavior do I expect of each identity?
• Benefits of an Identity fabric include:
• Manages full lifecycle of user/device identities and privileges
• Ensures that identities have the right access to right
resources
• Traces all activity to the identity responsible – contextual
accountability
• Keeps sensitive information protected regardless of location
and method of access
• Keeps security credentials protected
Start with a Strong Identity Fabric
© 2012 NetIQ Corporation. All rights reserved.11
Go beyond with “Identity Context”
• Deliver additional, rich context
about users and events to
security monitoring tools
• See “who” the individual is;
know if their activities are
business-appropriate.
– Integrate identity intelligence
with security monitoring
– Roles, access rights, permissions
– Increase visibility and control
across complex IT landscape
– Cloud, mobile, virtual
© 2012 NetIQ Corporation. All rights reserved.12
Go further with “Identity Context”
Speed response times to threats and reduce the compliance effort.
• Identify when user activity is unusual, anomalous or
outside normal business practices
• Demonstrate that access is under control, meets
compliance requirements
Andy Anderson
What actions have they been
performing in those applications?
What applications has this user
been using?
What privilege changes have
been applied?
© 2012 NetIQ Corporation. All rights reserved.13
Leverage the Identity Fabric
Access can be a service consumed from a
cloud provider or provided within the organization
Access control MUST include the following:
- Federated Identity Controls
- Multi domain
- Cloud awareness
- Audit history of cloud activity
Then Access Management….
© 2012 NetIQ Corporation. All rights reserved.14
Problem…
CLOUD RESOURCES
• Separate accounts exist in cloud-based
resources
• Creating accounts in cloud services is a manual
process, whether IT creates the account or if the
user creates the account
• Users must remember separate passwords for
each cloud service, and often use their
credentials
• No compliance reporting of user activity in the
cloud service
Corporate
credentials
No single sign-
on or strong
authentication
Manual
process
IT department No reporting
© 2012 NetIQ Corporation. All rights reserved.15
Solution…
CLOUD RESOURCES
• Provide an automated process to provision
user accounts to the cloud resources
• Provide secure single sign-on to the cloud
services w/o the credentials leaving the security
realm
• Provide the ability for users to securely access
the cloud service inside or outside of the
organization
• Provide compliance reporting of the users’
activities in the cloud service
Corporate credentials
Single sign-on
and strong
authentication
Automatic
process
IT department
Full
reporting
Cloud
Access
© 2012 NetIQ Corporation. All rights reserved.16
Results…
ENFORCED SECURITY to the Cloud without
impacting existing infrastructure
Onsite IAM
Cloud
Resources
Provisioning /
de-provisioning
Compliance
event reporting
Strong AuthN
SSO
LDAP directories
Federated
© 2012 NetIQ Corporation. All rights reserved.17
With Continuous Monitoring and
Compliance
• Maintain security and
compliance processes to
defend against attacks.
• Implement a lifecycle approach
to reduce risk from threats.
– Define and refine processes
– Good security should be the goal,
not “passing the audit.”
Policy
Assess
Evaluate
Risk
AuditRemediate
© 2012 NetIQ Corporation. All rights reserved.18
More On Continuous Compliance
Need to close security and compliance gaps by combining user
provisioning, access management, security
monitoring, privileged user management.
Provide process automation working in real time ensuring
compliance with predefined policies.
Provide both data correlation and anomaly detection to address
known and unknown risk areas.
Provide real-time event alerts and remediation based
on policy.
© 2012 NetIQ Corporation. All rights reserved.19
© 2012 NetIQ Corporation. All rights reserved.20
NEEDED: both business and technical views of
what’s happening across your hybrid cloud infrastructure.
An effective visibility solution must include:
Role-based dashboards based on the image required for
the user to do their job
Business metrics tie-in as basis of upcoming business
decisions based on data provided
Aggregation and analysis of events occurring on-premise
and across all cloud environments
And Visibility…
© 2012 NetIQ Corporation. All rights reserved.21
EFFECTIVE VISIBILITY solutions must include:
• Integrate & correlate cross domain data into one
centralized dashboard
• Automatically model IT, application, & business services
• Intuitive, role-based “service view” speeds problem
isolation
• Built-in impact & root-cause analysis to shorten resolution
time by 50%, or more
More on Visibility…
© 2012 NetIQ Corporation. All rights reserved.22
ADM
SLM
CMDB360
Asset Data
Compliance
Data
Business
Metrics
Configuration
DataIT Management
Data
Discovery
Data
• Integrates & correlates
existing IT data into one
centralized dashboard
• Automatically models IT,
application, & business
services
• Intuitive, role-based
“service view” speeds
problem isolation
• Built-in impact & root-
cause analysis shortens
resolution time by 50%,
or more
Single Pane of Glass View
© 2012 NetIQ Corporation. All rights reserved.23
It’s possible: a secure, compliant
multi-domain environment
1. You must start with a strong on-premise
identity platform
2. You must architect for loosely coupled, federated
access to cloud and on-premise services
3. You must leverage technologies designed to include
cloud domains
4. You must select service providers that support your
multi-domain management architecture.
© 2012 NetIQ Corporation. All rights reserved.24
About NetIQ
• Provide expertise and experience in Identity, Access
Management and Security Management
• Help reduce number of privileged users
• Reduce and manage privileges
• Monitor users and look for unusual activity
• Provide visibility into access rights to critical resources
• Harden systems against attackers
© 2012 NetIQ Corporation. All rights reserved.25
© 2012 NetIQ Corporation. All rights reserved.26
Powering Cloud Service Providers
NetIQ
Cloud Manager
NetIQ
Services Director
Monetizable
As A Service
Offerings
Infrastructure
Marketplace &
Deployment
Monitoring
Identity
Management
Access
Management
SEIM
Privileged
User Mgmt
Identity
Management
Access
Management
Compliance
Management
Infrastructure
Disaster
Recovery
Migrating to
Cloud
SLA
Dashboards
Monitoring
Governance
© 2012 NetIQ Corporation. All rights reserved.27
© 2012 NetIQ Corporation. All rights reserved.28
+1 713.548.1700 (Worldwide)
888.323.6768 (Toll-free)
info@netiq.com
NetIQ.com
Worldwide Headquarters
1233 West Loop South
Suite 810
Houston, TX 77027 USA
http://community.netiq.com
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2013 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

More Related Content

PPTX
Leveraging Identity to Manage Change and Complexity
PPTX
Building A Cloud-Ready Security Program
PPTX
From reactive to automated reducing costs through mature security processes i...
PPTX
Cloud is not an option, but is security?
PPTX
Scrubbing Your Active Directory Squeaky Clean
PPTX
A Smarter, More Secure Internet of Things
PDF
The Three Critical Steps for Effective BYOD Management
PDF
5 Essential Tips for Creating An Effective BYOD Policy
Leveraging Identity to Manage Change and Complexity
Building A Cloud-Ready Security Program
From reactive to automated reducing costs through mature security processes i...
Cloud is not an option, but is security?
Scrubbing Your Active Directory Squeaky Clean
A Smarter, More Secure Internet of Things
The Three Critical Steps for Effective BYOD Management
5 Essential Tips for Creating An Effective BYOD Policy

What's hot (20)

PDF
Manage risk by protecting apps, data and usage
PDF
Mt26 identity management as a service
PDF
IT Risk Management & Compliance
PPTX
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
PDF
Industry 4.0 : How to Build Relevant IT Skills
PPTX
Smart Analytics for The Big Unknown
PDF
MT82 IoT Security Starts at Edge
PPT
IBM Security Strategy Intelligence,
PPT
Building an Effective Identity Management Strategy
PDF
Cloud Services & the Development of ISO/IEC 27018
PDF
Cloud computing - Risks and Mitigation - GTS
PPTX
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
PPTX
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
PPTX
Modern Architectures
PDF
7.5 steps to overlaying byod & iot
PDF
Security Strategies for Success
PDF
Matrix Vision Deck
PDF
IT Service & Asset Management Better Together
PPTX
Csa summit seguridad en el sddc
PPTX
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Manage risk by protecting apps, data and usage
Mt26 identity management as a service
IT Risk Management & Compliance
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Industry 4.0 : How to Build Relevant IT Skills
Smart Analytics for The Big Unknown
MT82 IoT Security Starts at Edge
IBM Security Strategy Intelligence,
Building an Effective Identity Management Strategy
Cloud Services & the Development of ISO/IEC 27018
Cloud computing - Risks and Mitigation - GTS
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Modern Architectures
7.5 steps to overlaying byod & iot
Security Strategies for Success
Matrix Vision Deck
IT Service & Asset Management Better Together
Csa summit seguridad en el sddc
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Ad

Viewers also liked (7)

PDF
Cloud security management by newvem
PPTX
Integrated Cloud Security
PPT
Enterprise Cloud Risk And Security
PPT
Data security in the cloud
PDF
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
PPTX
External Analysis Strategic Management Ljmu
PPTX
Cloud security ppt
Cloud security management by newvem
Integrated Cloud Security
Enterprise Cloud Risk And Security
Data security in the cloud
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
External Analysis Strategic Management Ljmu
Cloud security ppt
Ad

Similar to Security Management in the Cloud (20)

PPTX
Securing your Cloud Deployment
PPT
How much does it cost to be Secure?
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
Security and Privacy Challenges in Cloud Computing Environments
PPT
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
PDF
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
PDF
Staying Secure When Moving to the Cloud - Dave Millier
PPTX
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
PPTX
Netskope — Shadow IT Is A Good Thing
PDF
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PDF
Avoiding Limitations of Traditional Approaches to Security
PPTX
20170912_Identity_and_Access_Management.pptx
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPTX
Identity Management and Access Governance (IDaaS)
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
CIS13: Security's New Normal: Is Cloud the Answer?
PPTX
Building a Secure Cloud with Identity Management
Securing your Cloud Deployment
How much does it cost to be Secure?
Advanced Persistent Threat - Evaluating Effective Responses
Security and Privacy Challenges in Cloud Computing Environments
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Staying Secure When Moving to the Cloud - Dave Millier
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
Netskope — Shadow IT Is A Good Thing
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
Avoiding Limitations of Traditional Approaches to Security
20170912_Identity_and_Access_Management.pptx
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Identity Management and Access Governance (IDaaS)
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
CIS13: Security's New Normal: Is Cloud the Answer?
Building a Secure Cloud with Identity Management

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Security Management in the Cloud

  • 1. Reigning in the Cloud: Regaining control of your Hybrid Cloud environment Gary Ardito Chief Architect, Cloud Service Provider Solutions Gary.Ardito@NetIQ.com
  • 2. © 2012 NetIQ Corporation. All rights reserved.2 Who am I? o 30 years solving business problems with technology o 15 + years as as principal architect – solutions that matter – Fortune 500, .com, Non Profits, Olympic Games o Consulted on business inhibitors, technology enablers and risk mitigation – thought leadership to move businesses forward o Historical leader of Identity and Access Management Market o Market leading products across Identity, Access, SIEM, and Compliance Management o Enabling cloud adoption by powering both service providers and enterprises
  • 3. © 2012 NetIQ Corporation. All rights reserved.3 Why are we here? o Cloud use is expanding and maturing … we are all moving to a hybrid cloud future o Mobile, Social, BYOD and the Internet Of Things are all reeking havoc with our security management o Current security management approaches are broken o Challenges exist for both Service Providers and Enterprises
  • 4. © 2012 NetIQ Corporation. All rights reserved.4 The Intelligent combination of internal and external resources to deliver the right mix of cost savings, service levels and business agility. Start with the Hybrid Cloud
  • 5. © 2012 NetIQ Corporation. All rights reserved.5 Add new computing contexts Users are driving change. Mobility BYOD Social IdentityCloud Enterprise Service Provider
  • 6. © 2012 NetIQ Corporation. All rights reserved.6 With new and unprecedented challenges New, Persistent Threats Expanding Computing Environment Business / Mission Keeps Moving Staff Stretched Thin Constant change & complexity results in lack of control and visibility
  • 7. © 2012 NetIQ Corporation. All rights reserved.7 How do we regain control?  Protection: Strongly enforce access, compliance, security and behavioral policies across all computing domains  Awareness: Capture activity with context for all events across the breadth of your computing environment  Visibility: Provide role-specific, business level dashboards exposing critical activity and patterns  Action: Policy based, real-time action based on appropriate remediation strategies
  • 8. © 2012 NetIQ Corporation. All rights reserved.8 Physical Virtual Cloud Secure Measure Manage Identity, Access, and Compliance Operational and SLA Dashboards Migrations, DR, and Brokering FIREWALL INTERNAL CLOUD (on-premise) EXTERNAL CLOUD (off-premise) Hybrid Cloud Requires new management frameworks.
  • 9. © 2012 NetIQ Corporation. All rights reserved.9 Hybrid Cloud Environment It starts with IDENTITY Access Mgmt Identity & Context Identity Management Awareness & Visibility
  • 10. © 2012 NetIQ Corporation. All rights reserved.10 Who and what interacts with the computing environment? What behavior do I expect of each identity? • Benefits of an Identity fabric include: • Manages full lifecycle of user/device identities and privileges • Ensures that identities have the right access to right resources • Traces all activity to the identity responsible – contextual accountability • Keeps sensitive information protected regardless of location and method of access • Keeps security credentials protected Start with a Strong Identity Fabric
  • 11. © 2012 NetIQ Corporation. All rights reserved.11 Go beyond with “Identity Context” • Deliver additional, rich context about users and events to security monitoring tools • See “who” the individual is; know if their activities are business-appropriate. – Integrate identity intelligence with security monitoring – Roles, access rights, permissions – Increase visibility and control across complex IT landscape – Cloud, mobile, virtual
  • 12. © 2012 NetIQ Corporation. All rights reserved.12 Go further with “Identity Context” Speed response times to threats and reduce the compliance effort. • Identify when user activity is unusual, anomalous or outside normal business practices • Demonstrate that access is under control, meets compliance requirements Andy Anderson What actions have they been performing in those applications? What applications has this user been using? What privilege changes have been applied?
  • 13. © 2012 NetIQ Corporation. All rights reserved.13 Leverage the Identity Fabric Access can be a service consumed from a cloud provider or provided within the organization Access control MUST include the following: - Federated Identity Controls - Multi domain - Cloud awareness - Audit history of cloud activity Then Access Management….
  • 14. © 2012 NetIQ Corporation. All rights reserved.14 Problem… CLOUD RESOURCES • Separate accounts exist in cloud-based resources • Creating accounts in cloud services is a manual process, whether IT creates the account or if the user creates the account • Users must remember separate passwords for each cloud service, and often use their credentials • No compliance reporting of user activity in the cloud service Corporate credentials No single sign- on or strong authentication Manual process IT department No reporting
  • 15. © 2012 NetIQ Corporation. All rights reserved.15 Solution… CLOUD RESOURCES • Provide an automated process to provision user accounts to the cloud resources • Provide secure single sign-on to the cloud services w/o the credentials leaving the security realm • Provide the ability for users to securely access the cloud service inside or outside of the organization • Provide compliance reporting of the users’ activities in the cloud service Corporate credentials Single sign-on and strong authentication Automatic process IT department Full reporting Cloud Access
  • 16. © 2012 NetIQ Corporation. All rights reserved.16 Results… ENFORCED SECURITY to the Cloud without impacting existing infrastructure Onsite IAM Cloud Resources Provisioning / de-provisioning Compliance event reporting Strong AuthN SSO LDAP directories Federated
  • 17. © 2012 NetIQ Corporation. All rights reserved.17 With Continuous Monitoring and Compliance • Maintain security and compliance processes to defend against attacks. • Implement a lifecycle approach to reduce risk from threats. – Define and refine processes – Good security should be the goal, not “passing the audit.” Policy Assess Evaluate Risk AuditRemediate
  • 18. © 2012 NetIQ Corporation. All rights reserved.18 More On Continuous Compliance Need to close security and compliance gaps by combining user provisioning, access management, security monitoring, privileged user management. Provide process automation working in real time ensuring compliance with predefined policies. Provide both data correlation and anomaly detection to address known and unknown risk areas. Provide real-time event alerts and remediation based on policy.
  • 19. © 2012 NetIQ Corporation. All rights reserved.19
  • 20. © 2012 NetIQ Corporation. All rights reserved.20 NEEDED: both business and technical views of what’s happening across your hybrid cloud infrastructure. An effective visibility solution must include: Role-based dashboards based on the image required for the user to do their job Business metrics tie-in as basis of upcoming business decisions based on data provided Aggregation and analysis of events occurring on-premise and across all cloud environments And Visibility…
  • 21. © 2012 NetIQ Corporation. All rights reserved.21 EFFECTIVE VISIBILITY solutions must include: • Integrate & correlate cross domain data into one centralized dashboard • Automatically model IT, application, & business services • Intuitive, role-based “service view” speeds problem isolation • Built-in impact & root-cause analysis to shorten resolution time by 50%, or more More on Visibility…
  • 22. © 2012 NetIQ Corporation. All rights reserved.22 ADM SLM CMDB360 Asset Data Compliance Data Business Metrics Configuration DataIT Management Data Discovery Data • Integrates & correlates existing IT data into one centralized dashboard • Automatically models IT, application, & business services • Intuitive, role-based “service view” speeds problem isolation • Built-in impact & root- cause analysis shortens resolution time by 50%, or more Single Pane of Glass View
  • 23. © 2012 NetIQ Corporation. All rights reserved.23 It’s possible: a secure, compliant multi-domain environment 1. You must start with a strong on-premise identity platform 2. You must architect for loosely coupled, federated access to cloud and on-premise services 3. You must leverage technologies designed to include cloud domains 4. You must select service providers that support your multi-domain management architecture.
  • 24. © 2012 NetIQ Corporation. All rights reserved.24 About NetIQ • Provide expertise and experience in Identity, Access Management and Security Management • Help reduce number of privileged users • Reduce and manage privileges • Monitor users and look for unusual activity • Provide visibility into access rights to critical resources • Harden systems against attackers
  • 25. © 2012 NetIQ Corporation. All rights reserved.25
  • 26. © 2012 NetIQ Corporation. All rights reserved.26 Powering Cloud Service Providers NetIQ Cloud Manager NetIQ Services Director Monetizable As A Service Offerings Infrastructure Marketplace & Deployment Monitoring Identity Management Access Management SEIM Privileged User Mgmt Identity Management Access Management Compliance Management Infrastructure Disaster Recovery Migrating to Cloud SLA Dashboards Monitoring Governance
  • 27. © 2012 NetIQ Corporation. All rights reserved.27
  • 28. © 2012 NetIQ Corporation. All rights reserved.28 +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA http://community.netiq.com
  • 29. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2013 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.

Editor's Notes

  • #6: Market Trends are Driving Change.
  • #7: 1 - Threat vectors constantly expanding – targeted attacks are well funded, patient, will use social media to identify insiders with ‘trusted’ access and find means to assume their ‘privileged’ credentials – often with very simple methods such as phishing email. Attacks are methodical, targeted and patient in their approach – quietly seek footholds towards targets of value. In the Heartland Payment Systems hack, hackers spent 6 months lurking within Heartland’s corporate network, patiently identifying key users with privileged access to key resources BEFORE they made their move to enter Heartland’s processing systems.Groups now using Dropbox and WordPress to distribute malware and initial command and control staging. When attackers get inside and assume access privileges of a trusted user, it can be very, very difficult to discern activity that is normal and proper from that which is maliciously working to gain stronger footholds of unauthorized control. John Kindervag tells story of hackers who gained admin access to a little used and poorly tuned enterprise network. It was later discovered that the hackers actually improved the configuration and performance of that network to boost the efficiency of their exfiltration operations. On the surface, such administration work sounds reasonable enough, but--maybe not.2 – The computing environment is constantly changing---- virtualization, cloud, BYOD/mobility. Often, security as an afterthought.3 – IT Security resources are likely stretched too thin, across multiple projects with conflicting priorities----and with less budget and time. 4 - With or without you, the business is going to keep moving forward --and will always side with productivity over security. ….constant change coupled with constant complexity adds up to loss of control and visibility – putting information assets at significant risk.