SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Sarbanes-Oxley                       Hitachi ID Solutions Supporting SOX Compliance

The Hitachi ID                           The SOX Challenge
Management Suite                         Regulatory compliance with the Sarbanes-Oxley Act (SOX) has created significant
                                         challenges for corporations listed on US stock exchanges. The Sarbanes-Oxley Act
The Hitachi ID Management Suite is       of 2002 was enacted in response to public accounting scandals at Enron, World-
an integrated solution for managing      Com, Tyco and elsewhere. It introduces new measures and amends existing ones
user onboarding, security manage-        to ensure that financial statements made by corporations are accurate, reliable and
ment and deactivation processes.         timely. To view the full text of the law go to http://frwebgate.access.gpo.gov/cgi-bin/
It uses automation, self-service,
                                         getdoc.cgi?dbname=107_cong_bills&docid=f:h3763enr.tst.pdf
consolidated and delegated ad-
ministration to reduce IT support
                                         Section 404 requires that management include in their annual report a statement of
cost, improve user productivity and
strengthen security.                     responsibility for internal controls and an assessment of the current state of internal
                                         controls. Internal controls are key to reliable financial reporting processes, and in
Some Hitachi ID Management Suite         turn internal controls depend on strong security in systems and applications:
users listed on US stock exchanges:
                                         • Who can access data that is material to financial reports?
• Affiliated Computer Services           • How are these users authenticated?
• Best Buy                               • What can they see and modify?
• Bristol-Myers Squibb                   • Are users held accountable for their actions?
• Computer Sciences Corporation
• Ford Motor Company
                                         These requirements are met by classic AAA infrastructure: Authentication, Authoriza-
• Honeywell
                                         tion and Audit. AAA infrastructure has been standard in enterprise applications for
• McDonald’s Corporation
                                         years. Unfortunately, a large and growing number of applications, combined with
• Merrill Lynch
• MetLife                                high staff mobility have made it much harder to manage user data. As a result, users
• Northrop Grumman                       get access rights inappropriate to their jobs and users may be inadequately authenti-
• Raytheon Company                       cated. Problems with user security include:
• Schering-Plough Corporation
• Symantec                               • Orphan accounts
• United Technologies Corporation        • Dormant accounts
                                         • Stale or excess privileges
                                         • Weak passwords
                                         • Vulnerable caller authentication at the help desk

                                         These weaknesses are not in the AAA technology -- they are in the business pro-
                                         cesses for managing user data.

                                         The Hitachi ID Management Suite Solution
                                         Organizations must implement sound processes to manage identities and entitle-
                                         ments, so that only the right users get access to the right data, at the right time.
                                         This is accomplished by:
                                         • Correlating different user IDs to people
                                         • Controling how users acquire and when they lose security rights
                                         • Logging current and historic access rights, to support audits
                                         • Periodic audits of user privileges, carried out by managers and application owners
                                         • Controlling access to administrative credentials
                                         • Requiring strong passwords or two-factor authentication
                                         • Using reliable processes to authenticate callers to the help desk
hitachi-id.com

Rapid Deployment                                                                                                                             Technical Specifications
                                                                                                                                             TARGET SYSTEM Integration
Identity management systems can be challenging to implement. Common problems
                                                                                                                                             Directory: Windows domains, Active Directory,
include poor user data quality, costly role engineering and hard to manage workflow                                                          eDirectory, Novell NDS, any LDAP
systems. To overcome these problems, the Hitachi ID Management Suite:                                                                        File/Print: Windows NT, 2000, 2003; Novell Net-
                                                                                                                                             Ware, Samba, PathWorks, OS2
• Leverages auto-discovery and self-service to find and map login IDs.
                                                                                                                                             Databases: Oracle, Sybase, SQL Server, DB2/
• Avoids costly role engineering entirely.                                                                                                   UDB, Informix
• Simplifies workflow management: one process to authorize all requests.                                                                     Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys,
                                                                                                                                             SCO, DG; passwd, shadow, TCB, Kerberos, NIS,
                                                                                                                                             NIS+
The Hitachi ID Management Suite                                                                                                              Mainframes: MVS/OS390/zOS, VM/ESA, Unisys,
                                                                                                                                             Siemens
                                                                                                                                             Minis: OS400, OpenVMS, Tandem
The Hitachi ID Management Suite is an integrated solution for managing user life-                                                            Applications: Oracle, PeopleSoft, SAP; open
cycles. It automates setup, maintenance and termination of user profiles, passwords                                                          plug-ins for SQL, ASPs, web services and more

and access.                                                                                                                                  Groupware: MS Exchange, Lotus Notes, Novell
                                                                                                                                             GroupWise
                                                                                                                                             Networking: RAS, routers, firewalls
Hitachi ID Automated Discovery                                                                                                               Flexible Agents: Target API, Telnet, TN3270,
                                                                                                                                             TN5250, HTTP(S), Web Services, command-line,
Map user IDs to owners and identify orphan and dormant accounts.
                                                                                                                                             SQL code, LDAP attributes

                                                                                                                                             Support Integration
Hitachi ID Password Manager
                                                                                                                                             Automatically create, update and close tickets
Enforce a global password policy and ensure that when users forget their password,                                                           on:
they are still reliably authenticated.                                                                                                       • Axios Assyst 	           • HP Service Manager
                                                                                                                                             • SupportSoft SmartIssue 	 • Tivoli Service Desk
                                                                                                                                             • Magic Service Desk 	     • Peregrine Service
Hitachi ID Identity Manager                                                                                                                  • Clarify eFrontOffice 	   • FrontRange HEAT
                                                                                                                                             • BMC Remedy AR System
Automatically deactivate access for terminated employees. Report on current and
past security rights.
                                                                                                                                             Additional integrations through e-mail, ODBC,
                                                                                                                                             web services and web forms integration.
Hitachi ID Access Certifier
Prompt managers, application owners and group owners to periodically review secu-
rity rights within their scope of authority. Deactivate inappropriate rights.

Hitachi ID Privileged Password Manager
Periodically randomize administrator passwords and control access to those ac-
counts by authenticating, authorizing and logging access.




                                                                                                                                           500, 1401 - 1 Street SE
                                                                                                                                           Calgary AB Canada T2G 2J3
  © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the   Tel: 1.403.233.0740 Fax: 1.403.233.0725
  United States and Canada. All other marks, symbols and trademarks are the property of their respective owners.                           E-Mail: info@Hitachi-ID.com

Contenu connexe

Tendances

Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsYuan Zhou
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 

Tendances (15)

Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applications
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 

En vedette

Identity Theft
Identity TheftIdentity Theft
Identity Theftkennedy2
 
Intercultural Aspcets of International Cooperation
Intercultural Aspcets of International CooperationIntercultural Aspcets of International Cooperation
Intercultural Aspcets of International CooperationNerijus Kriauciunas
 
SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)Maintenance Connection
 
Post Method for Social Media Strategy
Post Method for Social Media StrategyPost Method for Social Media Strategy
Post Method for Social Media StrategyJohn Haydon
 
Agility and the Customer Experience
Agility and the Customer ExperienceAgility and the Customer Experience
Agility and the Customer ExperienceThoughtworks
 
ESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAgutierrez2010
 

En vedette (8)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
VMA
VMAVMA
VMA
 
Intercultural Aspcets of International Cooperation
Intercultural Aspcets of International CooperationIntercultural Aspcets of International Cooperation
Intercultural Aspcets of International Cooperation
 
SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)
 
Post Method for Social Media Strategy
Post Method for Social Media StrategyPost Method for Social Media Strategy
Post Method for Social Media Strategy
 
Agility and the Customer Experience
Agility and the Customer ExperienceAgility and the Customer Experience
Agility and the Customer Experience
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
ESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIA
 

Similaire à SOX Compliance with Hitachi ID Management Suite

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
IGC Solutions for IBM ECM
IGC Solutions for IBM ECMIGC Solutions for IBM ECM
IGC Solutions for IBM ECMkaterogersbrown
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcarejckirby
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcarejckirby
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanOsama Abushaban
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 

Similaire à SOX Compliance with Hitachi ID Management Suite (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
IGC Solutions for IBM ECM
IGC Solutions for IBM ECMIGC Solutions for IBM ECM
IGC Solutions for IBM ECM
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 

Plus de Hitachi ID Systems, Inc.

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 

Plus de Hitachi ID Systems, Inc. (17)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

SOX Compliance with Hitachi ID Management Suite

  • 1. Sarbanes-Oxley Hitachi ID Solutions Supporting SOX Compliance The Hitachi ID The SOX Challenge Management Suite Regulatory compliance with the Sarbanes-Oxley Act (SOX) has created significant challenges for corporations listed on US stock exchanges. The Sarbanes-Oxley Act The Hitachi ID Management Suite is of 2002 was enacted in response to public accounting scandals at Enron, World- an integrated solution for managing Com, Tyco and elsewhere. It introduces new measures and amends existing ones user onboarding, security manage- to ensure that financial statements made by corporations are accurate, reliable and ment and deactivation processes. timely. To view the full text of the law go to http://frwebgate.access.gpo.gov/cgi-bin/ It uses automation, self-service, getdoc.cgi?dbname=107_cong_bills&docid=f:h3763enr.tst.pdf consolidated and delegated ad- ministration to reduce IT support Section 404 requires that management include in their annual report a statement of cost, improve user productivity and strengthen security. responsibility for internal controls and an assessment of the current state of internal controls. Internal controls are key to reliable financial reporting processes, and in Some Hitachi ID Management Suite turn internal controls depend on strong security in systems and applications: users listed on US stock exchanges: • Who can access data that is material to financial reports? • Affiliated Computer Services • How are these users authenticated? • Best Buy • What can they see and modify? • Bristol-Myers Squibb • Are users held accountable for their actions? • Computer Sciences Corporation • Ford Motor Company These requirements are met by classic AAA infrastructure: Authentication, Authoriza- • Honeywell tion and Audit. AAA infrastructure has been standard in enterprise applications for • McDonald’s Corporation years. Unfortunately, a large and growing number of applications, combined with • Merrill Lynch • MetLife high staff mobility have made it much harder to manage user data. As a result, users • Northrop Grumman get access rights inappropriate to their jobs and users may be inadequately authenti- • Raytheon Company cated. Problems with user security include: • Schering-Plough Corporation • Symantec • Orphan accounts • United Technologies Corporation • Dormant accounts • Stale or excess privileges • Weak passwords • Vulnerable caller authentication at the help desk These weaknesses are not in the AAA technology -- they are in the business pro- cesses for managing user data. The Hitachi ID Management Suite Solution Organizations must implement sound processes to manage identities and entitle- ments, so that only the right users get access to the right data, at the right time. This is accomplished by: • Correlating different user IDs to people • Controling how users acquire and when they lose security rights • Logging current and historic access rights, to support audits • Periodic audits of user privileges, carried out by managers and application owners • Controlling access to administrative credentials • Requiring strong passwords or two-factor authentication • Using reliable processes to authenticate callers to the help desk
  • 2. hitachi-id.com Rapid Deployment Technical Specifications TARGET SYSTEM Integration Identity management systems can be challenging to implement. Common problems Directory: Windows domains, Active Directory, include poor user data quality, costly role engineering and hard to manage workflow eDirectory, Novell NDS, any LDAP systems. To overcome these problems, the Hitachi ID Management Suite: File/Print: Windows NT, 2000, 2003; Novell Net- Ware, Samba, PathWorks, OS2 • Leverages auto-discovery and self-service to find and map login IDs. Databases: Oracle, Sybase, SQL Server, DB2/ • Avoids costly role engineering entirely. UDB, Informix • Simplifies workflow management: one process to authorize all requests. Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys, SCO, DG; passwd, shadow, TCB, Kerberos, NIS, NIS+ The Hitachi ID Management Suite Mainframes: MVS/OS390/zOS, VM/ESA, Unisys, Siemens Minis: OS400, OpenVMS, Tandem The Hitachi ID Management Suite is an integrated solution for managing user life- Applications: Oracle, PeopleSoft, SAP; open cycles. It automates setup, maintenance and termination of user profiles, passwords plug-ins for SQL, ASPs, web services and more and access. Groupware: MS Exchange, Lotus Notes, Novell GroupWise Networking: RAS, routers, firewalls Hitachi ID Automated Discovery Flexible Agents: Target API, Telnet, TN3270, TN5250, HTTP(S), Web Services, command-line, Map user IDs to owners and identify orphan and dormant accounts. SQL code, LDAP attributes Support Integration Hitachi ID Password Manager Automatically create, update and close tickets Enforce a global password policy and ensure that when users forget their password, on: they are still reliably authenticated. • Axios Assyst • HP Service Manager • SupportSoft SmartIssue • Tivoli Service Desk • Magic Service Desk • Peregrine Service Hitachi ID Identity Manager • Clarify eFrontOffice • FrontRange HEAT • BMC Remedy AR System Automatically deactivate access for terminated employees. Report on current and past security rights. Additional integrations through e-mail, ODBC, web services and web forms integration. Hitachi ID Access Certifier Prompt managers, application owners and group owners to periodically review secu- rity rights within their scope of authority. Deactivate inappropriate rights. Hitachi ID Privileged Password Manager Periodically randomize administrator passwords and control access to those ac- counts by authenticating, authorizing and logging access. 500, 1401 - 1 Street SE Calgary AB Canada T2G 2J3 © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the Tel: 1.403.233.0740 Fax: 1.403.233.0725 United States and Canada. All other marks, symbols and trademarks are the property of their respective owners. E-Mail: info@Hitachi-ID.com