SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISV
Case study of NetIQ ISV project
OVERVIEW
• NetIQ is an enterprise software company that provides products for identity and
access management, security and data center management
• Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard
application for risk and security compliance
• The clients for this application include Fortune 500 companies across numerous
industries as well as the United States government
CHALLENGES
• The solution was required to align security metrics gathered from users’
IT systems to demonstrate compliance with IT related policies and
regulations
• Those metrics had to be displayed in a powerful yet easy to understand,
web based dashboard for compliance management
• This solution also had to analyze IT risk factors such as compliance
exceptions and vulnerabilities across the key areas of the user’s business.
SOLUTION
• Atlas architects and engineers designed, developed and continue to
provide ongoing implementation services for the NetIQ Risk and
Compliance Center as well as the complete suite of NetIQ security
products
• Atlas Systems works closely with domain experts to perform
requirements gathering for Implementation Services, execute Product
Configuration/Product Enhancements, data integration and conversion
services
RESULTS
• Demonstrates regulatory compliance —The solution maps technical assessment results to
specific regulations and standards to present key compliance metrics for different control
areas. From high-level compliance reports, managers can drill down to problem areas and
render management reports based on regulation or security standard (e.g., Sarbanes-Oxley,
HIPAA, FISMA, ISO 17799).
• Delivers on-going risk analysis —The solution measures IT security risk in your environment
using innovative metric models that factor in the nature of compliance exceptions and
vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting,
along with executive overviews, makes it easy to spot potential problems before they impact
services or security.
• Centralizes security information for easier access and decision-making —The solution mines
security assessment results reflecting system configurations, vulnerabilities, patch levels, user
accounts and permissions, auditing and more into an enterprise dashboard.With easier access
to critical security information, managers can quickly assess security risks and regulatory
compliance in order to allocate resources effectively
• Turns complex data into actionable information —The solution presents information in easy-
to-understand charts, graphs and executive summaries via a customizable interface.Views can
be tailored to your regulatory, organizational and technical needs and drill down capabilities
make it easy to go from a high-level summary to a detailed analysis.

Contenu connexe

Tendances

Software architecture
Software architectureSoftware architecture
Software architecture
Rifad Mohamed
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdub
Product Camp Dublin
 

Tendances (20)

AMS Aconet
AMS AconetAMS Aconet
AMS Aconet
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
AMS Invision
AMS InvisionAMS Invision
AMS Invision
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firm
 
AMS Guardian 360
AMS Guardian 360AMS Guardian 360
AMS Guardian 360
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenter
 
IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
 
interface 9 what it is
interface 9 what it isinterface 9 what it is
interface 9 what it is
 
Remote dba
Remote dbaRemote dba
Remote dba
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
 
AMS Bid hunter
AMS Bid hunterAMS Bid hunter
AMS Bid hunter
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrix
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaS
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdub
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Ppt01
Ppt01Ppt01
Ppt01
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product Creation
 

Similaire à ISV Net iq

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
Phong Ho
 

Similaire à ISV Net iq (20)

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochure
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
RESUME16
RESUME16RESUME16
RESUME16
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 

Plus de Atlas Systems (10)

SAP automobile major
SAP automobile majorSAP automobile major
SAP automobile major
 
DBA Thomson reuters db
DBA Thomson reuters dbDBA Thomson reuters db
DBA Thomson reuters db
 
BD JD power_1
BD JD power_1BD JD power_1
BD JD power_1
 
AMS Trilogy
AMS TrilogyAMS Trilogy
AMS Trilogy
 
AMS Spider
AMS SpiderAMS Spider
AMS Spider
 
AMS Skill derby
AMS Skill derbyAMS Skill derby
AMS Skill derby
 
AMS Miggly
AMS MigglyAMS Miggly
AMS Miggly
 
AMS Love sms
AMS Love smsAMS Love sms
AMS Love sms
 
AMS IT client
AMS IT clientAMS IT client
AMS IT client
 
Large health plan
Large health planLarge health plan
Large health plan
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

ISV Net iq

  • 1. ISV Case study of NetIQ ISV project
  • 2. OVERVIEW • NetIQ is an enterprise software company that provides products for identity and access management, security and data center management • Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard application for risk and security compliance • The clients for this application include Fortune 500 companies across numerous industries as well as the United States government
  • 3. CHALLENGES • The solution was required to align security metrics gathered from users’ IT systems to demonstrate compliance with IT related policies and regulations • Those metrics had to be displayed in a powerful yet easy to understand, web based dashboard for compliance management • This solution also had to analyze IT risk factors such as compliance exceptions and vulnerabilities across the key areas of the user’s business.
  • 4. SOLUTION • Atlas architects and engineers designed, developed and continue to provide ongoing implementation services for the NetIQ Risk and Compliance Center as well as the complete suite of NetIQ security products • Atlas Systems works closely with domain experts to perform requirements gathering for Implementation Services, execute Product Configuration/Product Enhancements, data integration and conversion services
  • 5. RESULTS • Demonstrates regulatory compliance —The solution maps technical assessment results to specific regulations and standards to present key compliance metrics for different control areas. From high-level compliance reports, managers can drill down to problem areas and render management reports based on regulation or security standard (e.g., Sarbanes-Oxley, HIPAA, FISMA, ISO 17799). • Delivers on-going risk analysis —The solution measures IT security risk in your environment using innovative metric models that factor in the nature of compliance exceptions and vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting, along with executive overviews, makes it easy to spot potential problems before they impact services or security. • Centralizes security information for easier access and decision-making —The solution mines security assessment results reflecting system configurations, vulnerabilities, patch levels, user accounts and permissions, auditing and more into an enterprise dashboard.With easier access to critical security information, managers can quickly assess security risks and regulatory compliance in order to allocate resources effectively • Turns complex data into actionable information —The solution presents information in easy- to-understand charts, graphs and executive summaries via a customizable interface.Views can be tailored to your regulatory, organizational and technical needs and drill down capabilities make it easy to go from a high-level summary to a detailed analysis.