building secure relationships across the enterprise

12
Building Secure Relationships Across The Enterprise Identity Management and Behavioral Analytics

Upload: forgerock

Post on 10-May-2015

202 views

Category:

Software


2 download

DESCRIPTION

A Breakout Session by Chris Silveira, Manager of Fraud Intelligence at Guardian Analytics. Presentation from the 2014 IRM Summit in Phoenix, Arizona

TRANSCRIPT

Page 1: Building Secure Relationships Across the Enterprise

Building Secure Relationships Across The EnterpriseIdentity Management and Behavioral Analytics

Page 2: Building Secure Relationships Across the Enterprise

Guardian Analytics

Proven at Hundreds of Companies

Pioneered individual behavioral analytics to fundamentally change fraud prevention/security

Patented technology

Online and mobile portals

Employee portals and access

Payments

25 million accounts protected

3 trillion in assets protected

2 billion sessions protects

National and community banks

Leading Security Technology

"Guardian Analytics…has a proven and effective fraud detection risk-scoring engine."

"Guardian Analytics possesses one of the clearest visions

for how to tackle fraud management.”

Deep Experience Detecting Unauthorized Access and Activity

Page 3: Building Secure Relationships Across the Enterprise

Strong Relationships Starts With Trust and Confidence

Control who users are and what their relationship is

Analyze if users are who they say they are and doing what they are supposed to

Identity Relationship Management

Consumer

Employee

Partner

Behavioral Analytics and Anomaly Detection

Page 4: Building Secure Relationships Across the Enterprise

Extending Relationships Starts With Trust and Confidence

Consumer

Employee

Partner

Know who users are and what their relationship is

Verify that users are who they say they are and doing what they are supposed to

Extend relationships and engagement (information, services, devices, etc.) without

increasing risk

Trust & Confidence

Identity Relationship Management

Behavioral Analytics and Anomaly Detection

Page 5: Building Secure Relationships Across the Enterprise

Cloud Apps

The Problem: Bad Actors Hide Behind Good Credentials

Consumer

Employee

Partner

External user compromised

Employees compromised or misuse privileges

Partners/ contractors

compromised

Financials

Data stores

Internal & External Bad Actors

Cloud apps

On-prem apps

Identity Relationship Management

Page 6: Building Secure Relationships Across the Enterprise

Cloud Apps

Bad Behavior Always Stands Out

Consumer

Employee

Partner

External user compromised

Employees compromised or misuse privileges

Partners/ contractors

compromised

Cloud Apps

Financials

Data stores

On-prem apps

User behavior

Device/IPInformation

Authentication & MFA

Application Access

Administrative Activities

Day and Time

• Each user has typical behavior

• Bad actors will do something unusual relative to typical or legitimate activity

Identity Relationship Management

Page 7: Building Secure Relationships Across the Enterprise

FraudMAP Analyzes Access Through OpenAM

Consumer

Employee

Partner

External user compromised

Employees compromised or misuse privileges

Partners/ contractors

compromised

User behavior

Device/IPInformation

Authentication & MFA

Application Access

Administrative Activities

Day and Time

a

Behavioral Analytics

Are users exhibiting any suspicious behavior?

Is access from an expected machine configuration?

Is it a suspicious device

Is their MFA workflow normal?

Is the user in a typical location or following a typical travel pattern?

Is the application access at an expected time or frequency

Are profile or authorization changes unusual?

Identity Relationship Management

Page 8: Building Secure Relationships Across the Enterprise

Behavioral Analytics/ Anomaly Detection in Action

Demonstration

Page 9: Building Secure Relationships Across the Enterprise

Actionable User Risk Assessment

Consumer

Employee

Partner

External user compromised

Employees compromised or misuse privileges

Partners/ contractors

compromised

User behavior

Device/IPInformation

Authentication & MFA

Application Access

Administrative Activities

Day and Time

a

Behavioral Analytics

Alert Enterprise

Real-time stepped-up authentication

Identity Relationship Management

Page 10: Building Secure Relationships Across the Enterprise

Integrated Identity Management and Behavioral Analytics

Consumer

Employee

Partner

Enhance security Proactively identify credential compromise or misuse

Enhance complianceUncover policy violations

Increase automation Drive risk-based decisions

Increase visibility Maintain historical and contextual view of user behavior

Extend relationships and enhance engagementGain confidence to open information, services, devices

Identity Relationship Management

Behavioral Analytics and Anomaly Detection

Page 11: Building Secure Relationships Across the Enterprise

Additional Examples – Behavioral Analytics

Screen shots.

Page 12: Building Secure Relationships Across the Enterprise

Thank You