An Overview<br />May, 2011<br />
Osirium<br />Meet&Maintain Compliance & Best Practices<br />Automate&Delegate SysAdmin Tasks<br />Manage&Control Privilege...
Drivers<br />Compliance & Best Practice<br />Automation & Delegation<br />Privilege User Management<br /><ul><li>Auditable...
Ownership, </li></ul>    accountability<br /><ul><li>Visibility, traceability
Simplify multi-vendor </li></ul>    device management<br /><ul><li>Automate common </li></ul>    tasks with delegation<br ...
Powerful capabilities
Serious risks</li></li></ul><li>UnrestrictedAccess<br />OverburdenedTeams<br />SharedCredentials<br />Pain<br />
Upcoming SlideShare
Loading in …5
×

Osirium Overview Presentation May 2011

672 views
627 views

Published on

A short presentation on Osirium\'s Unified Security &amp; Infrastructure Management Solution (USIM).

USIM encompasses Privileged User Management, IT Automation and Delegation, Compliance and Best Practice to transform the way organisations manage, protect and implement change across multi-vendor infrastructures.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
672
On SlideShare
0
From Embeds
0
Number of Embeds
22
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Osirium Overview Presentation May 2011

  1. 1.
  2. 2. An Overview<br />May, 2011<br />
  3. 3. Osirium<br />Meet&Maintain Compliance & Best Practices<br />Automate&Delegate SysAdmin Tasks<br />Manage&Control Privileged Users<br />Multi-Vendor Infrastructure<br />
  4. 4. Drivers<br />Compliance & Best Practice<br />Automation & Delegation<br />Privilege User Management<br /><ul><li>Auditable compliance
  5. 5. Ownership, </li></ul> accountability<br /><ul><li>Visibility, traceability
  6. 6. Simplify multi-vendor </li></ul> device management<br /><ul><li>Automate common </li></ul> tasks with delegation<br /><ul><li>Scaling automated </li></ul> tasks across multiple <br /> devices<br /><ul><li>Privileged accounts
  7. 7. Powerful capabilities
  8. 8. Serious risks</li></li></ul><li>UnrestrictedAccess<br />OverburdenedTeams<br />SharedCredentials<br />Pain<br />
  9. 9. Osirium<br />Firewalls<br />Senior SysAdmin<br />Help Desk<br />SuperAdmin<br />Read /Write Access<br />Delegated Tasks<br />Osirium Admin<br />Other Devices & Applications<br />Switches <br />& Routers<br />Auditors<br />Strong Authentication<br />Scheduled Tasks<br />Read Only Access<br />Semi - Automated Tasks<br />Contractors<br />Custom Business Process Tasks<br />Content Security<br />Time Based Access<br />Proxy Servers<br />Network<br />Services<br />Logs & Reports<br />Windows Servers<br />3rd Party Services<br />IDS <br />Network Management Zone<br />
  10. 10. Compliance & Best Practice<br />Automation & Delegation<br />Privileged User Management<br />Audit & Reporting<br />Task Automation<br />Unique Identifiable Users<br />Remediation<br />Delegation<br />Password Management<br />Closed-loop Change Mgmt.<br />Error Free Tasks<br />Single Sign-On<br />Self-service Fulfilment <br />Infrastructure Awareness<br />Role-based Access Control<br />Compliance<br />Operations<br />Security<br />MULTI VENDOR INFRASTRUCTURE<br />anewapproach<br />

×