SlideShare a Scribd company logo
Sarbanes-Oxley                       Hitachi ID Solutions Supporting SOX Compliance

The Hitachi ID                           The SOX Challenge
Management Suite                         Regulatory compliance with the Sarbanes-Oxley Act (SOX) has created significant
                                         challenges for corporations listed on US stock exchanges. The Sarbanes-Oxley Act
The Hitachi ID Management Suite is       of 2002 was enacted in response to public accounting scandals at Enron, World-
an integrated solution for managing      Com, Tyco and elsewhere. It introduces new measures and amends existing ones
user onboarding, security manage-        to ensure that financial statements made by corporations are accurate, reliable and
ment and deactivation processes.         timely. To view the full text of the law go to http://frwebgate.access.gpo.gov/cgi-bin/
It uses automation, self-service,
                                         getdoc.cgi?dbname=107_cong_bills&docid=f:h3763enr.tst.pdf
consolidated and delegated ad-
ministration to reduce IT support
                                         Section 404 requires that management include in their annual report a statement of
cost, improve user productivity and
strengthen security.                     responsibility for internal controls and an assessment of the current state of internal
                                         controls. Internal controls are key to reliable financial reporting processes, and in
Some Hitachi ID Management Suite         turn internal controls depend on strong security in systems and applications:
users listed on US stock exchanges:
                                         • Who can access data that is material to financial reports?
• Affiliated Computer Services           • How are these users authenticated?
• Best Buy                               • What can they see and modify?
• Bristol-Myers Squibb                   • Are users held accountable for their actions?
• Computer Sciences Corporation
• Ford Motor Company
                                         These requirements are met by classic AAA infrastructure: Authentication, Authoriza-
• Honeywell
                                         tion and Audit. AAA infrastructure has been standard in enterprise applications for
• McDonald’s Corporation
                                         years. Unfortunately, a large and growing number of applications, combined with
• Merrill Lynch
• MetLife                                high staff mobility have made it much harder to manage user data. As a result, users
• Northrop Grumman                       get access rights inappropriate to their jobs and users may be inadequately authenti-
• Raytheon Company                       cated. Problems with user security include:
• Schering-Plough Corporation
• Symantec                               • Orphan accounts
• United Technologies Corporation        • Dormant accounts
                                         • Stale or excess privileges
                                         • Weak passwords
                                         • Vulnerable caller authentication at the help desk

                                         These weaknesses are not in the AAA technology -- they are in the business pro-
                                         cesses for managing user data.

                                         The Hitachi ID Management Suite Solution
                                         Organizations must implement sound processes to manage identities and entitle-
                                         ments, so that only the right users get access to the right data, at the right time.
                                         This is accomplished by:
                                         • Correlating different user IDs to people
                                         • Controling how users acquire and when they lose security rights
                                         • Logging current and historic access rights, to support audits
                                         • Periodic audits of user privileges, carried out by managers and application owners
                                         • Controlling access to administrative credentials
                                         • Requiring strong passwords or two-factor authentication
                                         • Using reliable processes to authenticate callers to the help desk
hitachi-id.com

Rapid Deployment                                                                                                                             Technical Specifications
                                                                                                                                             TARGET SYSTEM Integration
Identity management systems can be challenging to implement. Common problems
                                                                                                                                             Directory: Windows domains, Active Directory,
include poor user data quality, costly role engineering and hard to manage workflow                                                          eDirectory, Novell NDS, any LDAP
systems. To overcome these problems, the Hitachi ID Management Suite:                                                                        File/Print: Windows NT, 2000, 2003; Novell Net-
                                                                                                                                             Ware, Samba, PathWorks, OS2
• Leverages auto-discovery and self-service to find and map login IDs.
                                                                                                                                             Databases: Oracle, Sybase, SQL Server, DB2/
• Avoids costly role engineering entirely.                                                                                                   UDB, Informix
• Simplifies workflow management: one process to authorize all requests.                                                                     Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys,
                                                                                                                                             SCO, DG; passwd, shadow, TCB, Kerberos, NIS,
                                                                                                                                             NIS+
The Hitachi ID Management Suite                                                                                                              Mainframes: MVS/OS390/zOS, VM/ESA, Unisys,
                                                                                                                                             Siemens
                                                                                                                                             Minis: OS400, OpenVMS, Tandem
The Hitachi ID Management Suite is an integrated solution for managing user life-                                                            Applications: Oracle, PeopleSoft, SAP; open
cycles. It automates setup, maintenance and termination of user profiles, passwords                                                          plug-ins for SQL, ASPs, web services and more

and access.                                                                                                                                  Groupware: MS Exchange, Lotus Notes, Novell
                                                                                                                                             GroupWise
                                                                                                                                             Networking: RAS, routers, firewalls
Hitachi ID Automated Discovery                                                                                                               Flexible Agents: Target API, Telnet, TN3270,
                                                                                                                                             TN5250, HTTP(S), Web Services, command-line,
Map user IDs to owners and identify orphan and dormant accounts.
                                                                                                                                             SQL code, LDAP attributes

                                                                                                                                             Support Integration
Hitachi ID Password Manager
                                                                                                                                             Automatically create, update and close tickets
Enforce a global password policy and ensure that when users forget their password,                                                           on:
they are still reliably authenticated.                                                                                                       • Axios Assyst 	           • HP Service Manager
                                                                                                                                             • SupportSoft SmartIssue 	 • Tivoli Service Desk
                                                                                                                                             • Magic Service Desk 	     • Peregrine Service
Hitachi ID Identity Manager                                                                                                                  • Clarify eFrontOffice 	   • FrontRange HEAT
                                                                                                                                             • BMC Remedy AR System
Automatically deactivate access for terminated employees. Report on current and
past security rights.
                                                                                                                                             Additional integrations through e-mail, ODBC,
                                                                                                                                             web services and web forms integration.
Hitachi ID Access Certifier
Prompt managers, application owners and group owners to periodically review secu-
rity rights within their scope of authority. Deactivate inappropriate rights.

Hitachi ID Privileged Password Manager
Periodically randomize administrator passwords and control access to those ac-
counts by authenticating, authorizing and logging access.




                                                                                                                                           500, 1401 - 1 Street SE
                                                                                                                                           Calgary AB Canada T2G 2J3
  © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the   Tel: 1.403.233.0740 Fax: 1.403.233.0725
  United States and Canada. All other marks, symbols and trademarks are the property of their respective owners.                           E-Mail: info@Hitachi-ID.com

More Related Content

What's hot

Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Systems, Inc.
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Systems, Inc.
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applications
Yuan Zhou
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
Prof. Jacques Folon (Ph.D)
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
guestf018d88
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
OracleIDM
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
Hitachi ID Systems, Inc.
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Systems, Inc.
 

What's hot (15)

Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applications
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 

Viewers also liked

Identity Theft
Identity TheftIdentity Theft
Identity Theft
kennedy2
 
Intercultural Aspcets of International Cooperation
Intercultural Aspcets of International CooperationIntercultural Aspcets of International Cooperation
Intercultural Aspcets of International Cooperation
Nerijus Kriauciunas
 
SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)
Maintenance Connection
 
Post Method for Social Media Strategy
Post Method for Social Media StrategyPost Method for Social Media Strategy
Post Method for Social Media Strategy
John Haydon
 
Agility and the Customer Experience
Agility and the Customer ExperienceAgility and the Customer Experience
Agility and the Customer ExperienceThoughtworks
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
Hitachi ID Systems, Inc.
 
ESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAgutierrez2010
 

Viewers also liked (8)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
VMA
VMAVMA
VMA
 
Intercultural Aspcets of International Cooperation
Intercultural Aspcets of International CooperationIntercultural Aspcets of International Cooperation
Intercultural Aspcets of International Cooperation
 
SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)SA02 - User and Password Management Techniques (MCU)
SA02 - User and Password Management Techniques (MCU)
 
Post Method for Social Media Strategy
Post Method for Social Media StrategyPost Method for Social Media Strategy
Post Method for Social Media Strategy
 
Agility and the Customer Experience
Agility and the Customer ExperienceAgility and the Customer Experience
Agility and the Customer Experience
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
ESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIAESPECTRO DE FRECUENCIA
ESPECTRO DE FRECUENCIA
 

Similar to Hitachi ID Solutions Supporting SOX Compliance

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
Hitachi ID Systems, Inc.
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
IGC Solutions for IBM ECM
IGC Solutions for IBM ECMIGC Solutions for IBM ECM
IGC Solutions for IBM ECMkaterogersbrown
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
Brandon Dunlap
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
Endeavour Software Technologies
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
jckirby
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
jckirby
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
C/D/H Technology Consultants
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
WSO2
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
Hitachi ID Systems, Inc.
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
Osama Abushaban
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
Novell
 

Similar to Hitachi ID Solutions Supporting SOX Compliance (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
IGC Solutions for IBM ECM
IGC Solutions for IBM ECMIGC Solutions for IBM ECM
IGC Solutions for IBM ECM
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 

More from Hitachi ID Systems, Inc.

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
Hitachi ID Systems, Inc.
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
Hitachi ID Systems, Inc.
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
Hitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
Hitachi ID Systems, Inc.
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
Hitachi ID Systems, Inc.
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
Hitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (17)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Hitachi ID Solutions Supporting SOX Compliance

  • 1. Sarbanes-Oxley Hitachi ID Solutions Supporting SOX Compliance The Hitachi ID The SOX Challenge Management Suite Regulatory compliance with the Sarbanes-Oxley Act (SOX) has created significant challenges for corporations listed on US stock exchanges. The Sarbanes-Oxley Act The Hitachi ID Management Suite is of 2002 was enacted in response to public accounting scandals at Enron, World- an integrated solution for managing Com, Tyco and elsewhere. It introduces new measures and amends existing ones user onboarding, security manage- to ensure that financial statements made by corporations are accurate, reliable and ment and deactivation processes. timely. To view the full text of the law go to http://frwebgate.access.gpo.gov/cgi-bin/ It uses automation, self-service, getdoc.cgi?dbname=107_cong_bills&docid=f:h3763enr.tst.pdf consolidated and delegated ad- ministration to reduce IT support Section 404 requires that management include in their annual report a statement of cost, improve user productivity and strengthen security. responsibility for internal controls and an assessment of the current state of internal controls. Internal controls are key to reliable financial reporting processes, and in Some Hitachi ID Management Suite turn internal controls depend on strong security in systems and applications: users listed on US stock exchanges: • Who can access data that is material to financial reports? • Affiliated Computer Services • How are these users authenticated? • Best Buy • What can they see and modify? • Bristol-Myers Squibb • Are users held accountable for their actions? • Computer Sciences Corporation • Ford Motor Company These requirements are met by classic AAA infrastructure: Authentication, Authoriza- • Honeywell tion and Audit. AAA infrastructure has been standard in enterprise applications for • McDonald’s Corporation years. Unfortunately, a large and growing number of applications, combined with • Merrill Lynch • MetLife high staff mobility have made it much harder to manage user data. As a result, users • Northrop Grumman get access rights inappropriate to their jobs and users may be inadequately authenti- • Raytheon Company cated. Problems with user security include: • Schering-Plough Corporation • Symantec • Orphan accounts • United Technologies Corporation • Dormant accounts • Stale or excess privileges • Weak passwords • Vulnerable caller authentication at the help desk These weaknesses are not in the AAA technology -- they are in the business pro- cesses for managing user data. The Hitachi ID Management Suite Solution Organizations must implement sound processes to manage identities and entitle- ments, so that only the right users get access to the right data, at the right time. This is accomplished by: • Correlating different user IDs to people • Controling how users acquire and when they lose security rights • Logging current and historic access rights, to support audits • Periodic audits of user privileges, carried out by managers and application owners • Controlling access to administrative credentials • Requiring strong passwords or two-factor authentication • Using reliable processes to authenticate callers to the help desk
  • 2. hitachi-id.com Rapid Deployment Technical Specifications TARGET SYSTEM Integration Identity management systems can be challenging to implement. Common problems Directory: Windows domains, Active Directory, include poor user data quality, costly role engineering and hard to manage workflow eDirectory, Novell NDS, any LDAP systems. To overcome these problems, the Hitachi ID Management Suite: File/Print: Windows NT, 2000, 2003; Novell Net- Ware, Samba, PathWorks, OS2 • Leverages auto-discovery and self-service to find and map login IDs. Databases: Oracle, Sybase, SQL Server, DB2/ • Avoids costly role engineering entirely. UDB, Informix • Simplifies workflow management: one process to authorize all requests. Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys, SCO, DG; passwd, shadow, TCB, Kerberos, NIS, NIS+ The Hitachi ID Management Suite Mainframes: MVS/OS390/zOS, VM/ESA, Unisys, Siemens Minis: OS400, OpenVMS, Tandem The Hitachi ID Management Suite is an integrated solution for managing user life- Applications: Oracle, PeopleSoft, SAP; open cycles. It automates setup, maintenance and termination of user profiles, passwords plug-ins for SQL, ASPs, web services and more and access. Groupware: MS Exchange, Lotus Notes, Novell GroupWise Networking: RAS, routers, firewalls Hitachi ID Automated Discovery Flexible Agents: Target API, Telnet, TN3270, TN5250, HTTP(S), Web Services, command-line, Map user IDs to owners and identify orphan and dormant accounts. SQL code, LDAP attributes Support Integration Hitachi ID Password Manager Automatically create, update and close tickets Enforce a global password policy and ensure that when users forget their password, on: they are still reliably authenticated. • Axios Assyst • HP Service Manager • SupportSoft SmartIssue • Tivoli Service Desk • Magic Service Desk • Peregrine Service Hitachi ID Identity Manager • Clarify eFrontOffice • FrontRange HEAT • BMC Remedy AR System Automatically deactivate access for terminated employees. Report on current and past security rights. Additional integrations through e-mail, ODBC, web services and web forms integration. Hitachi ID Access Certifier Prompt managers, application owners and group owners to periodically review secu- rity rights within their scope of authority. Deactivate inappropriate rights. Hitachi ID Privileged Password Manager Periodically randomize administrator passwords and control access to those ac- counts by authenticating, authorizing and logging access. 500, 1401 - 1 Street SE Calgary AB Canada T2G 2J3 © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the Tel: 1.403.233.0740 Fax: 1.403.233.0725 United States and Canada. All other marks, symbols and trademarks are the property of their respective owners. E-Mail: info@Hitachi-ID.com