SlideShare une entreprise Scribd logo
1  sur  30
IBM Security Identity Governance (CrossIdeas) 
Technical presentation & Demo 
© 2014 IBM Corporation 
IBM Security 
Marco Venuti 
VP Technical Sales 
CrossIdeas – an IBM Company 
Marco.venuti@crossideas.com 
©1 2014 IBM Corporation
© 2014 IBM Corporation 
IBM Security 
Agenda 
2 
• ISIM + ISIG Integration scenario 
• Integration roadmap 
• Live demo 
• Q&A 
IBM sellers and business partners use only
ISIM + ISIG 
Integration Scenario 
3 © 2014 IBM Corporation
© 2014 IBM Corporation 
IBM Security 
ISIM + ISIG for existing ISIM customers 
4 
IBM Security Identity Governance and Administration 
• Existing ISIM customer with Access Request Management exposed to business users 
• Introducing ISIG to deliver Recertification campaign and Analytics capabilities 
Security Identity Governance 
Role Management 
Access Request Mgmt. 
Access 
Review/Recertification 
Compliance Controls/SoD 
Security Identity Manager 
Password 
Management/Self Service 
ISIM Adapter 
Access Request Mgmt. 
Provisioning, Fulfillment 
Reconciliation 
ISIM Identity Store CrossIdeas Warehouse
For IBM and business partner use only 
 Available now, developed as a TDI adapter 
 TDI Assembly line for full and delta synchronization 
 Developed on TDI version 7.1, ISIM 6.1 – TDI7.0 and ITIM 
5.1 are supported 
 IDEAS API based integration 
© 2014 IBM Corporation 
IBM Security 
ISIM – ISIG Integration 
5 
Person User 
Org Unit Org Unit 
Service Application 
Account Account 
<Permission>* Permission 
Role Role 
* Connector Specific (e.g. “Group” for AD)
© 2014 IBM Corporation 
IBM Security 
For IBM and business partner use only 
ISIM  ISIG: Supported Events 
6 
Org Unit 
• Add / Modify / Delete 
• Add / Remove Member 
6 
Permission 
• Add / Remove 
• Add / Remove Member 
User 
• Add / Modify / Delete 
• Suspend / Restore 
Service 
• Add / Modify / Delete 
Account 
• Add / Modify / Delete 
• Suspend / Restore 
Role 
• Add / Remove 
• Add / Remove Member 
Bulk Sync + Incremental
© 2014 IBM Corporation 
IBM Security 
For IBM and business partner use only 
ISIG  ISIM: Supported Events 
7 
7 
User 
• Add / Modify / Delete 
• Suspend / Restore 
Org Unit 
• Add / Modify / Delete 
• Add / Remove Member 
Account 
• Add / Modify / Delete 
• Suspend / Restore 
Role 
• Add / Remove 
• Add / Remove Member 
Permission 
• Add / Remove 
• Add / Remove Member 
Service 
• Add / Modify / Delete 
Write Back
Integration Roadmap 
8 © 2014 IBM Corporation
© 2014 IBM Corporation 
IBM Security 
9 
ISC – Single, Common Portal for SIG+SIM 
Govern Access 
Open 
IBM Security Identity Governance and Administration 
Scenario based easy to use interface for a line of business persona and do-it-yourself 
administrators. Option on ISC are controlled via user permissions.
© 2014 IBM Corporation 
IBM Security 
10 
Integrated IGA vision 
IBM Security Identity 
Manager 
IBM Security 
Identity 
Governance 
(CrossIdeas) 
IBM Security Directory Integrator 
IBM Security Access 
Manager 
Identity Administration Identity Governance 
On /Off Premises Applications and Enterprise Resources 
Access Enforcement 
• User Provisioning 
• Password Management 
• Access Request 
• Access Certification 
• Role Modelling 
• Identity Warehouse 
• Web, Federated SSO 
• Strong Authentication 
• Context-based Access 
Identity Governance & Administration
Live Demo 
11 © 2014 IBM Corporation
© 2014 IBM Corporation 
IBM Security 
12 
ISIG… to answer common IGA questions 
How do I model policies and then detect and manage violations? 
IT Security 
How can I build meaningful roles? 
Application 
Managers 
What does an attestation campaign or an access request look like? 
Business 
Manager 
How do I measure access risk and monitor progresses? 
CFO / CRO 
Office
© 2014 IBM Corporation 
IBM Security 
IDEAS Glossary - Entitlement Hierarchy 
13 
Business Roles 
IT Roles 
Application 1 Application 2 
Application Permissions 
Entitlements
© 2014 IBM Corporation 
IBM Security 
Role Deployment 
14 
How do I deal with existing users? 
✓ 
✓ Identify users whose access 
matches role content 
New role assignment 
Fine grain assignments removal 
Upshifting applicable assignment - from permission to role 
– Reduction of user assigned items in the IDEAS perspective 
– No impact on user access
Managing Segregation of Duties 
15 © 2014 IBM Corporation
 The company invested in Roles to better model ‘who-could-do-what’ 
© 2014 IBM Corporation 
IBM Security 
About Roles… 
16
 The company invested in Roles to better model ‘who-could-do-what’ 
© 2014 IBM Corporation 
IBM Security 
About Roles… 
 They started implementing SoD on Roles 
17 
 e.g. Role A should not be jointly delivered with Role B
 The company invested in Roles to better model ‘who-could-do-what’ 
© 2014 IBM Corporation 
IBM Security 
About Roles… 
 They started implementing SoD on Roles 
18 
 e.g. Role A should not be jointly delivered with Role B 
Detected 
Violation 
But….. auditors do not “trust” roles
© 2014 IBM Corporation 
IBM Security 
IT Thinks in Terms of Roles – Auditors Don’t 
19 
Auditor: 
 “Let me ignore roles and look directly 
at user permissions assignments” 
 “By the way…roles should be subject 
to the audit too”
SoD Rules = Business Rules 
 Auditors do think of SoD in terms of conflicting business 
© 2014 IBM Corporation 
IBM Security 
20 
activities 
Activity A Activity B Conflict details 
Source: xls deliverable by a major auditor firm – extract
© 2014 IBM Corporation 
IBM Security 
IDEAS Glossary – Activity Tree 
21 
Activity A Activity B 
The xls based activity list can be 
converted in IDEAS in a tree like 
representation 
 Pure business level description of a company’s tasks 
• Derived from Auditor / Advisor recommendations 
• OR Extracted from company existing GRC/PM systems 
• OR Created from industry specific templates
© 2014 IBM Corporation 
IBM Security 
22 
SoD constraints are links 
among activities, also coming 
from the xls version 
IDEAS Glossary – SoD Constraints 
Conflict details 
 Pure business level description of a Risk - no IT details 
• Derived from Auditor / Advisor recommendations 
• OR Extracted from company existing GRC/PM systems 
• OR Created from industry specific templates
© 2014 IBM Corporation 
IBM Security 
IDEAS Glossary – Technical Transformation 
23 
Business activities mapping onto 
required Application Entitlements 
– Making IT Entitlement names understandable to 
business users 
– Provided by the application owners
IDEAS Glossary – SoD Modeling 
Two complementary ways to look at the application estate…. 
© 2014 IBM Corporation 
IBM Security 
24 
User and Roles 
 Subject of the violation analysis 
Technical Transformation 
 Application-owner defined 
Activities and SoD rules 
 Best practices or business-owner 
defined
© 2014 IBM Corporation 
IBM Security 
IDEAS Glossary - User Analysis 
User Violation 
25 
 User assigned to entitlements 
linked to conflicting activities, 
either through conflicting roles…
© 2014 IBM Corporation 
IBM Security 
IDEAS Glossary - User Analysis 
User Violation 
26 
 User assigned to entitlements 
linked to conflicting activities, 
either through conflicting 
roles…or directly
Roles Vs Activities 
Clean distinction between Access delivery Vs. Access control 
© 2014 IBM Corporation 
IBM Security 
27 
Roles 
• Best Approach for effective 
Provisioning 
Activities 
• Best approach for effective SoD 
modeling
 Access Review to allow Role 
Mining is further delaying the 
SoD Introduction 
© 2014 IBM Corporation 
IBM Security 
Activity vs. Role Based SoD 
28 
Role Mining 
/ Modeling 
Define SoD 
on Roles 
Entitlement 
s 
Collection 
Role Mining 
/ Modeling 
Entitlement 
s 
Collection 
Activity 
Based SoD 
Role Based SoD 
 Role needs to come first 
Activity Based SoD 
 SoD Analysis can be the first, or 
the only, objective 
 Roles can be the subject of the 
SoD Analysis
© 2014 IBM Corporation 
IBM Security 
29
© 2014 IBM Corporation 
IBM Security 
30

Contenu connexe

Tendances

5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?C/D/H Technology Consultants
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 

Tendances (20)

5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 

En vedette

Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity managementNis
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Smart ERP Solutions, Inc.
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 CA CISA Jayjit Biswas
 
The Future is Now: What’s New in ForgeRock Identity Gateway
The Future is Now: What’s New in ForgeRock Identity GatewayThe Future is Now: What’s New in ForgeRock Identity Gateway
The Future is Now: What’s New in ForgeRock Identity GatewayForgeRock
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesAlan McSweeney
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance frameworkkaiyun7631
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesBoris Otto
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model DATUM LLC
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesForgeRock
 
Implementing Effective Data Governance
Implementing Effective Data GovernanceImplementing Effective Data Governance
Implementing Effective Data GovernanceChristopher Bradley
 

En vedette (14)

Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Erp-PMO
Erp-PMOErp-PMO
Erp-PMO
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
 
Project Planning, Design and Management
Project Planning, Design and ManagementProject Planning, Design and Management
Project Planning, Design and Management
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
The Future is Now: What’s New in ForgeRock Identity Gateway
The Future is Now: What’s New in ForgeRock Identity GatewayThe Future is Now: What’s New in ForgeRock Identity Gateway
The Future is Now: What’s New in ForgeRock Identity Gateway
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory Services
 
Implementing Effective Data Governance
Implementing Effective Data GovernanceImplementing Effective Data Governance
Implementing Effective Data Governance
 

Similaire à CrossIdeas Roadshow IAM Governance IBM Marco Venuti

Introduction to IBM API Management
Introduction to IBM API Management Introduction to IBM API Management
Introduction to IBM API Management Patrick Bouillaud
 
Impact2013 tsa 1416--api mgmt
Impact2013 tsa 1416--api mgmtImpact2013 tsa 1416--api mgmt
Impact2013 tsa 1416--api mgmtEric Kuefler
 
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections AppProlifics
 
Identity and Access Management - IDM365
Identity and Access Management - IDM365 Identity and Access Management - IDM365
Identity and Access Management - IDM365 ITMC
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategyRMayo22
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is NowLane Billings
 
IBM Platform for Social Business IamLUG 2013
IBM Platform for Social Business IamLUG 2013IBM Platform for Social Business IamLUG 2013
IBM Platform for Social Business IamLUG 2013Luis Guirigay
 
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps IBM UrbanCode Products
 
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps AdoptionMobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps AdoptionSanjeev Sharma
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud ChallengeVMware Tanzu
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...apidays
 
From Continuous Integration to DevOps - Japan Innovate 2013
From Continuous Integration to DevOps - Japan Innovate 2013From Continuous Integration to DevOps - Japan Innovate 2013
From Continuous Integration to DevOps - Japan Innovate 2013Sanjeev Sharma
 
Best practices for cloud hosted api management
Best practices for cloud hosted api managementBest practices for cloud hosted api management
Best practices for cloud hosted api managementsflynn073
 
Creating your own cloud hosted APIM platform
Creating your own cloud hosted APIM platformCreating your own cloud hosted APIM platform
Creating your own cloud hosted APIM platformsflynn073
 
Sunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y UsersSunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y UsersMitch Cohen
 
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...William Holmes
 

Similaire à CrossIdeas Roadshow IAM Governance IBM Marco Venuti (20)

Introduction to IBM API Management
Introduction to IBM API Management Introduction to IBM API Management
Introduction to IBM API Management
 
Impact2013 tsa 1416--api mgmt
Impact2013 tsa 1416--api mgmtImpact2013 tsa 1416--api mgmt
Impact2013 tsa 1416--api mgmt
 
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections App
 
Identity and Access Management - IDM365
Identity and Access Management - IDM365 Identity and Access Management - IDM365
Identity and Access Management - IDM365
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
IBM Platform for Social Business IamLUG 2013
IBM Platform for Social Business IamLUG 2013IBM Platform for Social Business IamLUG 2013
IBM Platform for Social Business IamLUG 2013
 
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
 
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps AdoptionMobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud Challenge
 
Api management customer
Api management customerApi management customer
Api management customer
 
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...
apidays LIVE Jakarta - Overcoming the 3 largest obstacles to digital transfor...
 
From Continuous Integration to DevOps - Japan Innovate 2013
From Continuous Integration to DevOps - Japan Innovate 2013From Continuous Integration to DevOps - Japan Innovate 2013
From Continuous Integration to DevOps - Japan Innovate 2013
 
Best practices for cloud hosted api management
Best practices for cloud hosted api managementBest practices for cloud hosted api management
Best practices for cloud hosted api management
 
Creating your own cloud hosted APIM platform
Creating your own cloud hosted APIM platformCreating your own cloud hosted APIM platform
Creating your own cloud hosted APIM platform
 
Sunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y UsersSunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y Users
 
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 

Plus de IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

Plus de IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Dernier

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 

Dernier (20)

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

CrossIdeas Roadshow IAM Governance IBM Marco Venuti

  • 1. IBM Security Identity Governance (CrossIdeas) Technical presentation & Demo © 2014 IBM Corporation IBM Security Marco Venuti VP Technical Sales CrossIdeas – an IBM Company Marco.venuti@crossideas.com ©1 2014 IBM Corporation
  • 2. © 2014 IBM Corporation IBM Security Agenda 2 • ISIM + ISIG Integration scenario • Integration roadmap • Live demo • Q&A IBM sellers and business partners use only
  • 3. ISIM + ISIG Integration Scenario 3 © 2014 IBM Corporation
  • 4. © 2014 IBM Corporation IBM Security ISIM + ISIG for existing ISIM customers 4 IBM Security Identity Governance and Administration • Existing ISIM customer with Access Request Management exposed to business users • Introducing ISIG to deliver Recertification campaign and Analytics capabilities Security Identity Governance Role Management Access Request Mgmt. Access Review/Recertification Compliance Controls/SoD Security Identity Manager Password Management/Self Service ISIM Adapter Access Request Mgmt. Provisioning, Fulfillment Reconciliation ISIM Identity Store CrossIdeas Warehouse
  • 5. For IBM and business partner use only  Available now, developed as a TDI adapter  TDI Assembly line for full and delta synchronization  Developed on TDI version 7.1, ISIM 6.1 – TDI7.0 and ITIM 5.1 are supported  IDEAS API based integration © 2014 IBM Corporation IBM Security ISIM – ISIG Integration 5 Person User Org Unit Org Unit Service Application Account Account <Permission>* Permission Role Role * Connector Specific (e.g. “Group” for AD)
  • 6. © 2014 IBM Corporation IBM Security For IBM and business partner use only ISIM  ISIG: Supported Events 6 Org Unit • Add / Modify / Delete • Add / Remove Member 6 Permission • Add / Remove • Add / Remove Member User • Add / Modify / Delete • Suspend / Restore Service • Add / Modify / Delete Account • Add / Modify / Delete • Suspend / Restore Role • Add / Remove • Add / Remove Member Bulk Sync + Incremental
  • 7. © 2014 IBM Corporation IBM Security For IBM and business partner use only ISIG  ISIM: Supported Events 7 7 User • Add / Modify / Delete • Suspend / Restore Org Unit • Add / Modify / Delete • Add / Remove Member Account • Add / Modify / Delete • Suspend / Restore Role • Add / Remove • Add / Remove Member Permission • Add / Remove • Add / Remove Member Service • Add / Modify / Delete Write Back
  • 8. Integration Roadmap 8 © 2014 IBM Corporation
  • 9. © 2014 IBM Corporation IBM Security 9 ISC – Single, Common Portal for SIG+SIM Govern Access Open IBM Security Identity Governance and Administration Scenario based easy to use interface for a line of business persona and do-it-yourself administrators. Option on ISC are controlled via user permissions.
  • 10. © 2014 IBM Corporation IBM Security 10 Integrated IGA vision IBM Security Identity Manager IBM Security Identity Governance (CrossIdeas) IBM Security Directory Integrator IBM Security Access Manager Identity Administration Identity Governance On /Off Premises Applications and Enterprise Resources Access Enforcement • User Provisioning • Password Management • Access Request • Access Certification • Role Modelling • Identity Warehouse • Web, Federated SSO • Strong Authentication • Context-based Access Identity Governance & Administration
  • 11. Live Demo 11 © 2014 IBM Corporation
  • 12. © 2014 IBM Corporation IBM Security 12 ISIG… to answer common IGA questions How do I model policies and then detect and manage violations? IT Security How can I build meaningful roles? Application Managers What does an attestation campaign or an access request look like? Business Manager How do I measure access risk and monitor progresses? CFO / CRO Office
  • 13. © 2014 IBM Corporation IBM Security IDEAS Glossary - Entitlement Hierarchy 13 Business Roles IT Roles Application 1 Application 2 Application Permissions Entitlements
  • 14. © 2014 IBM Corporation IBM Security Role Deployment 14 How do I deal with existing users? ✓ ✓ Identify users whose access matches role content New role assignment Fine grain assignments removal Upshifting applicable assignment - from permission to role – Reduction of user assigned items in the IDEAS perspective – No impact on user access
  • 15. Managing Segregation of Duties 15 © 2014 IBM Corporation
  • 16.  The company invested in Roles to better model ‘who-could-do-what’ © 2014 IBM Corporation IBM Security About Roles… 16
  • 17.  The company invested in Roles to better model ‘who-could-do-what’ © 2014 IBM Corporation IBM Security About Roles…  They started implementing SoD on Roles 17  e.g. Role A should not be jointly delivered with Role B
  • 18.  The company invested in Roles to better model ‘who-could-do-what’ © 2014 IBM Corporation IBM Security About Roles…  They started implementing SoD on Roles 18  e.g. Role A should not be jointly delivered with Role B Detected Violation But….. auditors do not “trust” roles
  • 19. © 2014 IBM Corporation IBM Security IT Thinks in Terms of Roles – Auditors Don’t 19 Auditor:  “Let me ignore roles and look directly at user permissions assignments”  “By the way…roles should be subject to the audit too”
  • 20. SoD Rules = Business Rules  Auditors do think of SoD in terms of conflicting business © 2014 IBM Corporation IBM Security 20 activities Activity A Activity B Conflict details Source: xls deliverable by a major auditor firm – extract
  • 21. © 2014 IBM Corporation IBM Security IDEAS Glossary – Activity Tree 21 Activity A Activity B The xls based activity list can be converted in IDEAS in a tree like representation  Pure business level description of a company’s tasks • Derived from Auditor / Advisor recommendations • OR Extracted from company existing GRC/PM systems • OR Created from industry specific templates
  • 22. © 2014 IBM Corporation IBM Security 22 SoD constraints are links among activities, also coming from the xls version IDEAS Glossary – SoD Constraints Conflict details  Pure business level description of a Risk - no IT details • Derived from Auditor / Advisor recommendations • OR Extracted from company existing GRC/PM systems • OR Created from industry specific templates
  • 23. © 2014 IBM Corporation IBM Security IDEAS Glossary – Technical Transformation 23 Business activities mapping onto required Application Entitlements – Making IT Entitlement names understandable to business users – Provided by the application owners
  • 24. IDEAS Glossary – SoD Modeling Two complementary ways to look at the application estate…. © 2014 IBM Corporation IBM Security 24 User and Roles  Subject of the violation analysis Technical Transformation  Application-owner defined Activities and SoD rules  Best practices or business-owner defined
  • 25. © 2014 IBM Corporation IBM Security IDEAS Glossary - User Analysis User Violation 25  User assigned to entitlements linked to conflicting activities, either through conflicting roles…
  • 26. © 2014 IBM Corporation IBM Security IDEAS Glossary - User Analysis User Violation 26  User assigned to entitlements linked to conflicting activities, either through conflicting roles…or directly
  • 27. Roles Vs Activities Clean distinction between Access delivery Vs. Access control © 2014 IBM Corporation IBM Security 27 Roles • Best Approach for effective Provisioning Activities • Best approach for effective SoD modeling
  • 28.  Access Review to allow Role Mining is further delaying the SoD Introduction © 2014 IBM Corporation IBM Security Activity vs. Role Based SoD 28 Role Mining / Modeling Define SoD on Roles Entitlement s Collection Role Mining / Modeling Entitlement s Collection Activity Based SoD Role Based SoD  Role needs to come first Activity Based SoD  SoD Analysis can be the first, or the only, objective  Roles can be the subject of the SoD Analysis
  • 29. © 2014 IBM Corporation IBM Security 29
  • 30. © 2014 IBM Corporation IBM Security 30