security, risk, and governance...security, risk, and governance take a holistic, analytics-driven...
TRANSCRIPT
Security, Risk, and GovernanceTake a holistic, analytics-driven approach to securing what matters most—identities, applications, and data
Roland Petersen
International (EMEA & LATAM) Presales Director – Security, Risk & Governance
What a difference a year makes!
2
Boardroom Agenda
Cybersecurity
Risk management
Corporate governance
Industry regulations
Market cap
OpEx & sales
Customer service
DevOps & IT Ops
Human resources
Investor confidence
3
Security Risk Governance
Domains merging to address concerns
Security, Risk,
& GovernanceSecurity Risk Governance
4
Cyber damages continue to outpace spend ▪ Looking ahead over the next 5 years
CSO online: Top 5 cybersecurity facts, figures and statistics for 2018
Cyber damages to
hit $6 trillion
annually by 2021
Up from $3 trillion
in 2015
Cyber security
spending to
exceed $1 trillion
from 2017 to 2021
Cyber crime will
more than triple the
number of unfilled
security jobs
Predicted to reach
3.5 million by 2021
Human attack
surface to reach
6 billion people
by 2022
Ransomware
damage costs are
predicted to reach
$11.5 billion
by 2019
5
Securing people and their data was simpler once
But has moved to a new level of complexity!
Data
Applications
Identities
7
Point solutions only address narrow problems
8
How does Micro Focussolve for these challenges?
17
Security, Risk, & GovernanceMicro Focus Portfolio
DATA GOVERNANCE & PROTECTION
APPLICATION SECURITY
IDENTITY & ACCESS MANAGEMENT ENDPOINT SECURITY
SECURITY OPERATIONS
INFORMATION ARCHIVING
ANALYTICS & MACHINE LEARNING
20
Security, Risk, & GovernanceMicro Focus Portfolio
IDENTITY & ACCESS MANAGEMENT
Govern who has access to what and how they’re using it
NetIQ
▪ Adaptive identity governance
▪ Identity life-cycle management
▪ Identity synchronization and reconciliation
▪ Centralized role management
▪ Frictionless authentication
▪ Advanced authentication methods
▪ User self-service portal
▪ Privileged identity management
▪ File integrity, configuration, and change
monitoring
Host Connectivity
▪ Manage access to host-based applications
GenLan – Micro Focus Gold Partner
Sebastijan ŠefTechnical Manager, Head of Development
21
IAM Use Case 1
Main drivers for IAM project
• Improve security
• GDPR compliance
• Eliminate manual processes
• Implement and streamline authorization
workflows
• Single sign-on
• Support the roll out of apps to sea-based and
land-based employees
23
Applications
Self-Service
24
IAM Use Case 2
Felles (Common)
Fylkeskommunale (County)
INTegrasjoner (Integrations)
Source
system 1
Source
system 2
Adapter Adapter
Co
mm
on
com
po
ne
nts
API
Provider Interface
Information
model
Application with access
https://www.fintlabs.no/
25
Fine.
So where does Micro Focus comes into play?
26
Access control
27
Micro Focus Access Management
Co
mm
on
com
po
ne
nts
Client
API1
Information model
Client
API2
Adapter
API1
Adapter
API2
Adapter
APIx
Client
APIx
Applications with access Source systems
28
Micro Focus Access Management
Co
mm
on
com
po
ne
nts
Client
API1
Information model
Client
API2
Adapter
API1
Adapter
API2
Adapter
APIx
Client
APIx
Manage Identities
Secure Applications
ProtectData
by governing privileges,
enforcing access controls,
& unifying identity stores.
by embedding strong
security and best practices
into DevOps processes.
by discovering where it is,
determining who has
access, and guarding it
wherever it resides.
Micro Focus Helps You:
33
Thank you.www.microfocus.com