SlideShare a Scribd company logo
ISV
Case study of NetIQ ISV project
OVERVIEW
• NetIQ is an enterprise software company that provides products for identity and
access management, security and data center management
• Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard
application for risk and security compliance
• The clients for this application include Fortune 500 companies across numerous
industries as well as the United States government
CHALLENGES
• The solution was required to align security metrics gathered from users’
IT systems to demonstrate compliance with IT related policies and
regulations
• Those metrics had to be displayed in a powerful yet easy to understand,
web based dashboard for compliance management
• This solution also had to analyze IT risk factors such as compliance
exceptions and vulnerabilities across the key areas of the user’s business.
SOLUTION
• Atlas architects and engineers designed, developed and continue to
provide ongoing implementation services for the NetIQ Risk and
Compliance Center as well as the complete suite of NetIQ security
products
• Atlas Systems works closely with domain experts to perform
requirements gathering for Implementation Services, execute Product
Configuration/Product Enhancements, data integration and conversion
services
RESULTS
• Demonstrates regulatory compliance —The solution maps technical assessment results to
specific regulations and standards to present key compliance metrics for different control
areas. From high-level compliance reports, managers can drill down to problem areas and
render management reports based on regulation or security standard (e.g., Sarbanes-Oxley,
HIPAA, FISMA, ISO 17799).
• Delivers on-going risk analysis —The solution measures IT security risk in your environment
using innovative metric models that factor in the nature of compliance exceptions and
vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting,
along with executive overviews, makes it easy to spot potential problems before they impact
services or security.
• Centralizes security information for easier access and decision-making —The solution mines
security assessment results reflecting system configurations, vulnerabilities, patch levels, user
accounts and permissions, auditing and more into an enterprise dashboard.With easier access
to critical security information, managers can quickly assess security risks and regulatory
compliance in order to allocate resources effectively
• Turns complex data into actionable information —The solution presents information in easy-
to-understand charts, graphs and executive summaries via a customizable interface.Views can
be tailored to your regulatory, organizational and technical needs and drill down capabilities
make it easy to go from a high-level summary to a detailed analysis.

More Related Content

What's hot

AMS Aconet
AMS AconetAMS Aconet
AMS Aconet
Atlas Systems
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
Atlas Systems
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
Atlas Systems
 
AMS Invision
AMS InvisionAMS Invision
AMS Invision
Atlas Systems
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
Atlas Systems
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firm
Atlas Systems
 
AMS Guardian 360
AMS Guardian 360AMS Guardian 360
AMS Guardian 360
Atlas Systems
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax Academy
 
IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
Rose Business Solutions
 
interface 9 what it is
interface 9 what it isinterface 9 what it is
interface 9 what it is
AtHand Solutions
 
Remote dba
Remote dbaRemote dba
Remote dba
Sakeesoft
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
Maintec Technologies Pvt Ltd
 
AMS Bid hunter
AMS Bid hunterAMS Bid hunter
AMS Bid hunter
Atlas Systems
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content
 
Software architecture
Software architectureSoftware architecture
Software architectureRifad Mohamed
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaS
Abhishek Minocha
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubProduct Camp Dublin
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
patmisasi
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product Creation
Vikram Singla FCILT
 

What's hot (20)

AMS Aconet
AMS AconetAMS Aconet
AMS Aconet
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
AMS Invision
AMS InvisionAMS Invision
AMS Invision
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firm
 
AMS Guardian 360
AMS Guardian 360AMS Guardian 360
AMS Guardian 360
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenter
 
IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
 
interface 9 what it is
interface 9 what it isinterface 9 what it is
interface 9 what it is
 
Remote dba
Remote dbaRemote dba
Remote dba
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
 
AMS Bid hunter
AMS Bid hunterAMS Bid hunter
AMS Bid hunter
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrix
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaS
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdub
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Ppt01
Ppt01Ppt01
Ppt01
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product Creation
 

Similar to ISV Net iq

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
Smart ERP Solutions, Inc.
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochure
Anthony Franzini
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
LexComply
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
HardikKundra
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
BiZZdesign
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
FixNix Inc.,
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
InSync Conference
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
ePlus
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
Tuan Phan
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
Lightwell
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qsPhong Ho
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
eG Innovations
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
Ahmadi Madi
 

Similar to ISV Net iq (20)

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochure
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
RESUME16
RESUME16RESUME16
RESUME16
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 

More from Atlas Systems

SAP automobile major
SAP automobile majorSAP automobile major
SAP automobile major
Atlas Systems
 
DBA Thomson reuters db
DBA Thomson reuters dbDBA Thomson reuters db
DBA Thomson reuters db
Atlas Systems
 
BD JD power_1
BD JD power_1BD JD power_1
BD JD power_1
Atlas Systems
 
AMS Trilogy
AMS TrilogyAMS Trilogy
AMS Trilogy
Atlas Systems
 
AMS Spider
AMS SpiderAMS Spider
AMS Spider
Atlas Systems
 
AMS Skill derby
AMS Skill derbyAMS Skill derby
AMS Skill derby
Atlas Systems
 
AMS Miggly
AMS MigglyAMS Miggly
AMS Miggly
Atlas Systems
 
AMS Love sms
AMS Love smsAMS Love sms
AMS Love sms
Atlas Systems
 
AMS IT client
AMS IT clientAMS IT client
AMS IT client
Atlas Systems
 
Large health plan
Large health planLarge health plan
Large health plan
Atlas Systems
 

More from Atlas Systems (10)

SAP automobile major
SAP automobile majorSAP automobile major
SAP automobile major
 
DBA Thomson reuters db
DBA Thomson reuters dbDBA Thomson reuters db
DBA Thomson reuters db
 
BD JD power_1
BD JD power_1BD JD power_1
BD JD power_1
 
AMS Trilogy
AMS TrilogyAMS Trilogy
AMS Trilogy
 
AMS Spider
AMS SpiderAMS Spider
AMS Spider
 
AMS Skill derby
AMS Skill derbyAMS Skill derby
AMS Skill derby
 
AMS Miggly
AMS MigglyAMS Miggly
AMS Miggly
 
AMS Love sms
AMS Love smsAMS Love sms
AMS Love sms
 
AMS IT client
AMS IT clientAMS IT client
AMS IT client
 
Large health plan
Large health planLarge health plan
Large health plan
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

ISV Net iq

  • 1. ISV Case study of NetIQ ISV project
  • 2. OVERVIEW • NetIQ is an enterprise software company that provides products for identity and access management, security and data center management • Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard application for risk and security compliance • The clients for this application include Fortune 500 companies across numerous industries as well as the United States government
  • 3. CHALLENGES • The solution was required to align security metrics gathered from users’ IT systems to demonstrate compliance with IT related policies and regulations • Those metrics had to be displayed in a powerful yet easy to understand, web based dashboard for compliance management • This solution also had to analyze IT risk factors such as compliance exceptions and vulnerabilities across the key areas of the user’s business.
  • 4. SOLUTION • Atlas architects and engineers designed, developed and continue to provide ongoing implementation services for the NetIQ Risk and Compliance Center as well as the complete suite of NetIQ security products • Atlas Systems works closely with domain experts to perform requirements gathering for Implementation Services, execute Product Configuration/Product Enhancements, data integration and conversion services
  • 5. RESULTS • Demonstrates regulatory compliance —The solution maps technical assessment results to specific regulations and standards to present key compliance metrics for different control areas. From high-level compliance reports, managers can drill down to problem areas and render management reports based on regulation or security standard (e.g., Sarbanes-Oxley, HIPAA, FISMA, ISO 17799). • Delivers on-going risk analysis —The solution measures IT security risk in your environment using innovative metric models that factor in the nature of compliance exceptions and vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting, along with executive overviews, makes it easy to spot potential problems before they impact services or security. • Centralizes security information for easier access and decision-making —The solution mines security assessment results reflecting system configurations, vulnerabilities, patch levels, user accounts and permissions, auditing and more into an enterprise dashboard.With easier access to critical security information, managers can quickly assess security risks and regulatory compliance in order to allocate resources effectively • Turns complex data into actionable information —The solution presents information in easy- to-understand charts, graphs and executive summaries via a customizable interface.Views can be tailored to your regulatory, organizational and technical needs and drill down capabilities make it easy to go from a high-level summary to a detailed analysis.