trusted advisor, professional, partnertrusted professional, partner advisor, hosted managed services...
TRANSCRIPT
TRUSTED
PROFESSIONAL,PARTNER
ADVISOR,
Hosted managed services enable a customer to hand off the burden and cost of establishing and managing additional infrastructure requirements. PathMaker Group provides hosted security and identity and access management solutions using industry-leading hosting facilities.
CLOUD MIGRATION STRATEGIES FOR:
• IBM Security Identity Manager (ISIM)• IBM Security Access Manager (ISAM)• IBM Security Identity Governance &
Intelligence (IGI)
MANAGED SECURITY SERVICE PROVIDER
PathMaker Group AWS Cloud
Security DirectoryIntegrator
Security Access Manager
Security DirectoryServer
Cloud Services
On-prem
Web Applications
Application Connectors
DB App Connectors
HR Authoritative Source
Security Directory Integrator
O/S User Connectors
Security Identity Manager / Security Identity Governance and Intelligence
[email protected](817) 704-3644 © PathMaker Group 2018
GET IN TOUCHDallas-Fort Worth 635 Fritz DriveSuite 110Coppell, TX 75019
Austin 1250 Capital of Texas HwyBldg 3, Suite 400Austin, TX 78746
• Inter-Zone deployments for increased fault tolerance
• All communication between managed instances is encrypted using native protocol TLS/SSL or inter-host IPSec tunnels
• All data at rest is encrypted on the drive volume
• All data in transit to/from instances to volume is encrypted
• AES-256 Encryption utilized for all cryptographic operations
• Strict Instance-based firewall rules (Least Privilege Model)
MANAGED SECURITY SERVICE PROVIDER
24-7 Management and monitoring by PathMaker Group’s Team of expert security consultants
Ongoing system health check and required maintenance including fix packs
Outsourced infrastructure management cost savings
• Non-routable address space for tenant-based instances with strict firewall rules for administration of tenant-based instances and functions
• Bastion security model secured with multi-factor authentication
• Daily Log analysis for security and performance events
• Daily encrypted snapshots of all platform data volumes
• Best practice IAM operational procedures designed to the principle of least privilege including Privileged Identity Management, Scheduled Access Reviews (Certification)
TRUSTED ADVISOR From strategic planning to realizing a fully mature IAM program
TRUSTED PROFESSIONAL Our experienced consultants are dedicated to the success of our clients
TRUSTED PARTNER Dedicated to the long-term success of your information security program
Finding the best identity solution includes having the freedom to choose from a deployment option that best aligns with your infrastructure strategy including SaaS, public cloud, data center, and trusted managed service provider.