SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
1
© Copyright 2015 EMC Corporation. All rights reserved.
Force Cyber Criminals to Shop Elsewhere
2
© Copyright 2015 EMC Corporation. All rights reserved.
Introductions - Our Presenters
Rob Sadowski
Director, Technology Solutions
Kimberlee Bachman
Senior Product Marketing Manager,
IAM Solutions
3
© Copyright 2015 EMC Corporation. All rights reserved.
• Cyber Security Challenges in Retail
• Identity Challenges in Retail
• Solution Best Practices
• RSA Identity Management and Governance
• Use Cases
• Q&A
Agenda
4
© Copyright 2015 EMC Corporation. All rights reserved.
Security Concerns in Retail
Need to protect
customer data
and intellectual
property
Need to secure
critical
systems
Cyber
criminals
focusing on
retailersRecent wave
of retailer
breaches
5
© Copyright 2015 EMC Corporation. All rights reserved.
• Payment card data
• Emphasis on compliance
• High employee turnover
Why Are Retailers an Attractive Target?
6
© Copyright 2015 EMC Corporation. All rights reserved.
Payment
Card
Information
Customer
Purchase
and Loyalty
Information
Intellectual
Property
Cyber criminals do not discriminate against data, they’ll take it all
Concern: More Than Just Payment Card Data
7
© Copyright 2015 EMC Corporation. All rights reserved.
Retailers’ Identity Specific Concerns
Compliance
Access to
Data
Role
Management
Access
Governance
Managing
Identity
Lifecycle
8
© Copyright 2015 EMC Corporation. All rights reserved.
Employee Timeline Highlights Identity Concerns
ReviewJoins LeavesRequest Review & Revoke
Roles & Suggested
Entitlements
Roles & Suggested
Entitlements
Moves
9
© Copyright 2015 EMC Corporation. All rights reserved.
Regular Access Reviews
Put process in place to stay audit compliant and know who has access to what
Business Driven Access Reviews
Fine Grained Entitlement Visibility
Remain Audit Compliant
Lower Organizational Risk
10
© Copyright 2015 EMC Corporation. All rights reserved.
Governing Access With Policies
Policies help automate access governance and improve workforce management
Joiner Mover Leaver
Time Based
Segregation of Duties
11
© Copyright 2015 EMC Corporation. All rights reserved.
Many People in Small Number of Roles
Corporate Users Hourly Workers Contractors
12
© Copyright 2015 EMC Corporation. All rights reserved.
Governing Privileged Access (PAM)
Know what accounts have extra privilege
and make sure that’s appropriate
Avoid any one admin or user having too
much access to valuable information
Manage employees, vendors and
contractors
Review who has privileged access
13
© Copyright 2015 EMC Corporation. All rights reserved.
Keeping Compliant
PCI DSS
HIPAA
SOX
Data Privacy
14
© Copyright 2015 EMC Corporation. All rights reserved.
RSA Identity Management and Governance (IMG)
15
© Copyright 2015 EMC Corporation. All rights reserved.
RSA IAM
Enabling trusted interactions between identities and information
Applications/Data/Resources
Identity Lifecycle
Compliance
Access Platform Governance Platform
Federation/SSO
Authentication
Employees/Partners/Customers
Provisioning
Identity Intelligence
16
© Copyright 2015 EMC Corporation. All rights reserved.
Shift Decision Making and Accountability to the Business
Centralized Identity & Business Context
Business Process-Driven
Policy-Based Automation
Business-Driven Approach to Governance
17
© Copyright 2015 EMC Corporation. All rights reserved.
A Phased Approach
Role & Group
Management
Access RequestPolicy
Management
Provisioning
Visibility &
Certification
Account &
Entitlement
Collection
Access Reviews
Segregation
of Duties
Role Discovery
& Definition
Role
Maintenance
Group Analysis
& Cleanup
Access
Request Portal
Policy-Based
Change
Management
Joiners,
Movers, and
Leavers
Task
Notification
Service Desk
Integration
Data
Visibility
Automated
Provisioning
Compliance
Controls
18
© Copyright 2015 EMC Corporation. All rights reserved.
RSA IMG Retail Use Cases
19
© Copyright 2015 EMC Corporation. All rights reserved.
Point of Sale Monitoring
IMG Helps Retail Customers Achieve Success
Challenge Solution
No way of knowing
which Point of Sale
kiosk is being used and
when
Grant entitlements to
individual POS kiosks
and name them by
region
20
© Copyright 2015 EMC Corporation. All rights reserved.
Unowned Accounts
IMG Helps Retail Customers Achieve Success
Challenge Solution
There are many
unowned accounts
Removed orphaned
accounts
21
© Copyright 2015 EMC Corporation. All rights reserved.
Seasonal Workers & Contractors
IMG Helps Retail Customers Achieve Success
Challenge Solution
Concerned with
seasonal workers and
contractors having
access for the right
period of time
Policies allow access to
be granted for a set
amount of time to the
right applications
22
© Copyright 2015 EMC Corporation. All rights reserved.
Operational Challenges
IMG Helps Retail Customers Achieve Success
Challenge Solution
There is operational
inefficiency at the
store level
Can put workflow in
place to manage
operations
23
© Copyright 2015 EMC Corporation. All rights reserved.
Q&A
EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.

Mais conteúdo relacionado

Mais procurados

APM Talk
APM TalkAPM Talk
APM TalkMongoDB
 
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...Prolifics
 
Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...NetAppUK
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
IT Transformation and Puppet
IT Transformation and Puppet IT Transformation and Puppet
IT Transformation and Puppet Puppet
 
Light Speed with Test Data Management
Light Speed with Test Data ManagementLight Speed with Test Data Management
Light Speed with Test Data ManagementKellyn Pot'Vin-Gorman
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentationEimantas
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organizationDr. Wilfred Lin (Ph.D.)
 
NetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank SowinNetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank Sowinfsowin
 
High availability is not a luxury webcast
High availability is not a luxury webcastHigh availability is not a luxury webcast
High availability is not a luxury webcastGina Tragos
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionSpanning Cloud Apps
 
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?RSD
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldInnoTech
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
 
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Hitachi Vantara
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudDe Novo
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 

Mais procurados (20)

APM Talk
APM TalkAPM Talk
APM Talk
 
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
 
Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
IT Transformation and Puppet
IT Transformation and Puppet IT Transformation and Puppet
IT Transformation and Puppet
 
Light Speed with Test Data Management
Light Speed with Test Data ManagementLight Speed with Test Data Management
Light Speed with Test Data Management
 
EMC Unified Analytics Platform. Gintaras Pelenis
EMC Unified Analytics Platform. Gintaras PelenisEMC Unified Analytics Platform. Gintaras Pelenis
EMC Unified Analytics Platform. Gintaras Pelenis
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organization
 
NetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank SowinNetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank Sowin
 
High availability is not a luxury webcast
High availability is not a luxury webcastHigh availability is not a luxury webcast
High availability is not a luxury webcast
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
 
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise Cloud
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 

Destaque

Thur change to s or d
Thur change to s or dThur change to s or d
Thur change to s or dTravis Klein
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...EMC
 
Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testingAleksandr Zhuikov
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targetsResearch Now
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingEMC
 
Iron mountain Records Management Observing
Iron mountain Records Management ObservingIron mountain Records Management Observing
Iron mountain Records Management ObservingNafi Putrawan
 
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...Microsoft TechNet - Belgium and Luxembourg
 
Thurs nuremburg trials
Thurs nuremburg trialsThurs nuremburg trials
Thurs nuremburg trialsTravis Klein
 
Chromatography lect 2
Chromatography lect 2Chromatography lect 2
Chromatography lect 2FLI
 

Destaque (17)

Toolmaking for Administrators using Windows PowerShell
Toolmaking for Administrators using Windows PowerShellToolmaking for Administrators using Windows PowerShell
Toolmaking for Administrators using Windows PowerShell
 
Team work
Team workTeam work
Team work
 
Tues islam hajj
Tues islam hajjTues islam hajj
Tues islam hajj
 
Fri rights of man
Fri rights of manFri rights of man
Fri rights of man
 
The brain challenge
The brain challengeThe brain challenge
The brain challenge
 
Thur change to s or d
Thur change to s or dThur change to s or d
Thur change to s or d
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
 
Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testing
 
Wed mexico
Wed mexicoWed mexico
Wed mexico
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targets
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
Iron mountain Records Management Observing
Iron mountain Records Management ObservingIron mountain Records Management Observing
Iron mountain Records Management Observing
 
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
 
Das
DasDas
Das
 
Thurs nuremburg trials
Thurs nuremburg trialsThurs nuremburg trials
Thurs nuremburg trials
 
Chromatography lect 2
Chromatography lect 2Chromatography lect 2
Chromatography lect 2
 
2.nd world war
2.nd world war2.nd world war
2.nd world war
 

Semelhante a Force Cyber Criminals to Shop Elsewhere

Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Pete Nieminen
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWSkarthisoft
 
MDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience ManagmentMDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience ManagmentEarley Information Science
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceCloudera, Inc.
 
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...CloudIDSummit
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 

Semelhante a Force Cyber Criminals to Shop Elsewhere (20)

Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWS
 
MDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience ManagmentMDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience Managment
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 

Mais de EMC

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkEMC
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningEMC
 
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014EMC
 

Mais de EMC (20)

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the Network
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
 

Último

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Último (20)

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

Force Cyber Criminals to Shop Elsewhere

  • 1. 1 © Copyright 2015 EMC Corporation. All rights reserved. Force Cyber Criminals to Shop Elsewhere
  • 2. 2 © Copyright 2015 EMC Corporation. All rights reserved. Introductions - Our Presenters Rob Sadowski Director, Technology Solutions Kimberlee Bachman Senior Product Marketing Manager, IAM Solutions
  • 3. 3 © Copyright 2015 EMC Corporation. All rights reserved. • Cyber Security Challenges in Retail • Identity Challenges in Retail • Solution Best Practices • RSA Identity Management and Governance • Use Cases • Q&A Agenda
  • 4. 4 © Copyright 2015 EMC Corporation. All rights reserved. Security Concerns in Retail Need to protect customer data and intellectual property Need to secure critical systems Cyber criminals focusing on retailersRecent wave of retailer breaches
  • 5. 5 © Copyright 2015 EMC Corporation. All rights reserved. • Payment card data • Emphasis on compliance • High employee turnover Why Are Retailers an Attractive Target?
  • 6. 6 © Copyright 2015 EMC Corporation. All rights reserved. Payment Card Information Customer Purchase and Loyalty Information Intellectual Property Cyber criminals do not discriminate against data, they’ll take it all Concern: More Than Just Payment Card Data
  • 7. 7 © Copyright 2015 EMC Corporation. All rights reserved. Retailers’ Identity Specific Concerns Compliance Access to Data Role Management Access Governance Managing Identity Lifecycle
  • 8. 8 © Copyright 2015 EMC Corporation. All rights reserved. Employee Timeline Highlights Identity Concerns ReviewJoins LeavesRequest Review & Revoke Roles & Suggested Entitlements Roles & Suggested Entitlements Moves
  • 9. 9 © Copyright 2015 EMC Corporation. All rights reserved. Regular Access Reviews Put process in place to stay audit compliant and know who has access to what Business Driven Access Reviews Fine Grained Entitlement Visibility Remain Audit Compliant Lower Organizational Risk
  • 10. 10 © Copyright 2015 EMC Corporation. All rights reserved. Governing Access With Policies Policies help automate access governance and improve workforce management Joiner Mover Leaver Time Based Segregation of Duties
  • 11. 11 © Copyright 2015 EMC Corporation. All rights reserved. Many People in Small Number of Roles Corporate Users Hourly Workers Contractors
  • 12. 12 © Copyright 2015 EMC Corporation. All rights reserved. Governing Privileged Access (PAM) Know what accounts have extra privilege and make sure that’s appropriate Avoid any one admin or user having too much access to valuable information Manage employees, vendors and contractors Review who has privileged access
  • 13. 13 © Copyright 2015 EMC Corporation. All rights reserved. Keeping Compliant PCI DSS HIPAA SOX Data Privacy
  • 14. 14 © Copyright 2015 EMC Corporation. All rights reserved. RSA Identity Management and Governance (IMG)
  • 15. 15 © Copyright 2015 EMC Corporation. All rights reserved. RSA IAM Enabling trusted interactions between identities and information Applications/Data/Resources Identity Lifecycle Compliance Access Platform Governance Platform Federation/SSO Authentication Employees/Partners/Customers Provisioning Identity Intelligence
  • 16. 16 © Copyright 2015 EMC Corporation. All rights reserved. Shift Decision Making and Accountability to the Business Centralized Identity & Business Context Business Process-Driven Policy-Based Automation Business-Driven Approach to Governance
  • 17. 17 © Copyright 2015 EMC Corporation. All rights reserved. A Phased Approach Role & Group Management Access RequestPolicy Management Provisioning Visibility & Certification Account & Entitlement Collection Access Reviews Segregation of Duties Role Discovery & Definition Role Maintenance Group Analysis & Cleanup Access Request Portal Policy-Based Change Management Joiners, Movers, and Leavers Task Notification Service Desk Integration Data Visibility Automated Provisioning Compliance Controls
  • 18. 18 © Copyright 2015 EMC Corporation. All rights reserved. RSA IMG Retail Use Cases
  • 19. 19 © Copyright 2015 EMC Corporation. All rights reserved. Point of Sale Monitoring IMG Helps Retail Customers Achieve Success Challenge Solution No way of knowing which Point of Sale kiosk is being used and when Grant entitlements to individual POS kiosks and name them by region
  • 20. 20 © Copyright 2015 EMC Corporation. All rights reserved. Unowned Accounts IMG Helps Retail Customers Achieve Success Challenge Solution There are many unowned accounts Removed orphaned accounts
  • 21. 21 © Copyright 2015 EMC Corporation. All rights reserved. Seasonal Workers & Contractors IMG Helps Retail Customers Achieve Success Challenge Solution Concerned with seasonal workers and contractors having access for the right period of time Policies allow access to be granted for a set amount of time to the right applications
  • 22. 22 © Copyright 2015 EMC Corporation. All rights reserved. Operational Challenges IMG Helps Retail Customers Achieve Success Challenge Solution There is operational inefficiency at the store level Can put workflow in place to manage operations
  • 23. 23 © Copyright 2015 EMC Corporation. All rights reserved. Q&A
  • 24. EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.