• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Veriphyr Service Overview
 

Veriphyr Service Overview

on

  • 1,218 views

Gartner predicts that by 2014, 50% of companies will shift IAM efforts to intelligence, rather than administration, due to the failure of notable IAM projects. ...

Gartner predicts that by 2014, 50% of companies will shift IAM efforts to intelligence, rather than administration, due to the failure of notable IAM projects.

Identity and Access Intelligence (IAI) — data collection, correlation, analytics and reporting — ensures that companies get quick answers to business questions, according Gartner.

Statistics

Views

Total Views
1,218
Views on SlideShare
1,095
Embed Views
123

Actions

Likes
0
Downloads
0
Comments
0

2 Embeds 123

http://blog.veriphyr.com 121
http://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Veriphyr Service Overview Veriphyr Service Overview Presentation Transcript

    • Identity and Access Intelligence (IAI)
      As a On-Demand Service
      Achieve Compliance by Discovering
      User Access Vulnerabilities and Abuse…from Data You Already Have
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
    • Identity and Access Intelligence (IAI)
      Gartner definition:
      Converting identity, rights, and activity data into knowledge for decision making by IT and business.
      Or
      Rights/Roles + User Activity = Business Intelligence
      $11.9 B for Identity & Access Management (IAM) by 2013 – Gartner
      50% of companies will shift IAM efforts to IAI by 2014 – Gartner
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      2
      February 19, 2011
    • VERIPHYR PROPRIETARY AND CONFIDENTIAL
      3
      February 19, 2011
      IAI is a “Must Have” for Access Compliance
      Regulatory Goal: Rights & Activity = Job Function
    • $680K fine for violation of HIPAA regulations on user access to ePHI(1/11)
      $11 million insider fraud bymanager misusing user access of her former staff (09)
      Jail and fine for hospital worker due to inappropriateaccess of ePHI(3/10)
      Proprietary data stolen by terminatedemployees viaunrevoked accounts (9/10)
      $6 billion in trading lossesby stock trader with excessive access from previous job (08)
      $650K fine for weak user access control for ePHI at 5 California hospitals (6/10)
      Reality: Rights & Activity ≠ Job Function
      #1 IT Audit Finding
      Excessive access rights
      #1 Insider Threat
      • User Access Abuse
      More Vulnerabilities and Abuse
      • Snooping ePHI and Other Sensitive Data
      • Terminated Users
      • Orphan/Ghost Accounts
      • Dormant Accounts
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      4
      February 19, 2011
    • Rights/Roles
      User CanAccess
      Veriphyr Technology“People AreWhat They Do” (Vs. What MgmtThinks They Do)
      What User Should and Should NotAccess
      Activity
      User DoesAccess
      Discover Inappropriate User Access
      • Potential - Vulnerabilities
      • Actual - Abuses
      VERIPHYR PROPRIETARY
      5
      February 19, 2011
    • VERIPHYR PROPRIETARY
      Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)
      Customer
      Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)
      Overcoming Barriers to AdoptionVeriphyr Service Does All the Work
      Cleanse,Collate, Correlate,
      Aggregate, and
      Analyze
      6
      February 19, 2011
    • VERIPHYR PROPRIETARY
      Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)
      Customer
      Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)
      Overcoming Barriers to AdoptionVeriphyr Service Does All the Work
      Cleanse,Collate, Correlate,
      Aggregate, and
      Analyze
      7
      February 19, 2011
    • VERIPHYR PROPRIETARY
      Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)
      Customer
      Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)
      Overcoming Barriers to AdoptionVeriphyr Service Does All the Work
      Cleanse,Collate, Correlate,
      Aggregate, and
      Analyze
      8
      February 19, 2011
    • 9
      Correlate across silos
      Apply analytics
      Deliver intelligenceinto the right hands
      Monitor status
      Report success
      Closed Loop Process
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      February 19, 2011
    • 10
      Correlate across silos
      Apply analytics
      Deliver intelligenceinto the right hands
      Monitor status
      Report success
      Closed Loop Process
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      February 19, 2011
    • 11
      Correlate across silos
      Apply analytics
      Deliver intelligenceinto the right hands
      Monitor status
      Report success
      Closed Loop Process
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      February 19, 2011
    • 12
      Correlate across silos
      Apply analytics
      Deliver intelligenceinto the right hands
      Monitor status
      Report success
      Closed Loop Process
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      February 19, 2011
    • 13
      Correlate across silos
      Apply analytics
      Deliver intelligenceinto the right hands
      Monitor status
      Report success
      Closed Loop Process
      VERIPHYR PROPRIETARY AND CONFIDENTIAL
      February 19, 2011
    • Identity and Access Intelligence (IAI)
      As a Cloud Service
      For more information contact me
      Alan Norquist
      Founder and CEO
      anorquist@veriphyr.com
      www.Veriphyr.com
      VERIPHYR PROPRIETARY AND CONFIDENTIAL