Successfully reported this slideshow.

Veriphyr slide share_20110219

231 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Veriphyr slide share_20110219

  1. 1. Identity and Access Intelligence (IAI) <br />As a On-Demand Service<br />Achieve Compliance by Discovering<br />User Access Vulnerabilities and Abuse…from Data You Already Have<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />
  2. 2. Identity and Access Intelligence (IAI) <br />Gartner definition:<br />Converting identity, rights, and activity data into knowledge for decision making by IT and business. <br />Or<br />Rights/Roles + User Activity = Business Intelligence<br />$11.9 B for Identity & Access Management (IAM) by 2013 – Gartner<br />50% of companies will shift IAM efforts to IAI by 2014 – Gartner<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />2<br />February 19, 2011<br />
  3. 3. VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />3<br />February 19, 2011<br />IAI is a “Must Have” for Access Compliance<br />Regulatory Goal: Rights & Activity = Job Function<br />
  4. 4. $680K fine for violation of HIPAA regulations on user access to ePHI(1/11)<br />$11 million insider fraud bymanager misusing user access of her former staff (09)<br />Jail and fine for hospital worker due to inappropriateaccess of ePHI(3/10)<br />Proprietary data stolen by terminatedemployees viaunrevoked accounts (9/10)<br />$6 billion in trading lossesby stock trader with excessive access from previous job (08)<br />$650K fine for weak user access control for ePHI at 5 California hospitals (6/10)<br />Reality: Rights & Activity ≠ Job Function<br />#1 IT Audit Finding<br />Excessive access rights<br />#1 Insider Threat <br /><ul><li>User Access Abuse</li></ul>More Vulnerabilities and Abuse<br /><ul><li>Snooping ePHI and Other Sensitive Data
  5. 5. Terminated Users
  6. 6. Orphan/Ghost Accounts
  7. 7. Dormant Accounts</li></ul>VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />4<br />February 19, 2011<br />
  8. 8. Rights/Roles<br />User CanAccess<br />Veriphyr Technology“People AreWhat They Do” (Vs. What MgmtThinks They Do)<br />What User Should and Should NotAccess<br />Activity<br />User DoesAccess<br />Discover Inappropriate User Access<br /><ul><li>Potential - Vulnerabilities
  9. 9. Actual - Abuses</li></ul>VERIPHYR PROPRIETARY<br />5<br />February 19, 2011<br />
  10. 10. VERIPHYR PROPRIETARY<br />Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)<br />Customer<br />Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)<br />Overcoming Barriers to AdoptionVeriphyr Service Does All the Work<br />Cleanse,Collate, Correlate,<br />Aggregate, and<br />Analyze<br />6<br />February 19, 2011<br />
  11. 11. VERIPHYR PROPRIETARY<br />Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)<br />Customer<br />Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)<br />Overcoming Barriers to AdoptionVeriphyr Service Does All the Work<br />Cleanse,Collate, Correlate,<br />Aggregate, and<br />Analyze<br />7<br />February 19, 2011<br />
  12. 12. VERIPHYR PROPRIETARY<br />Identity, Rights, Activity,in Any Raw Native Format(encrypted connection)<br />Customer<br />Insight on User Access Vulnerabilities, Abuse,and Compliance(encrypted data)<br />Overcoming Barriers to AdoptionVeriphyr Service Does All the Work<br />Cleanse,Collate, Correlate,<br />Aggregate, and<br />Analyze<br />8<br />February 19, 2011<br />
  13. 13. 9<br />Correlate across silos<br />Apply analytics <br />Deliver intelligenceinto the right hands<br />Monitor status<br />Report success<br />Closed Loop Process<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />February 19, 2011<br />
  14. 14. 10<br />Correlate across silos<br />Apply analytics <br />Deliver intelligenceinto the right hands<br />Monitor status<br />Report success<br />Closed Loop Process<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />February 19, 2011<br />
  15. 15. 11<br />Correlate across silos<br />Apply analytics <br />Deliver intelligenceinto the right hands<br />Monitor status<br />Report success<br />Closed Loop Process<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />February 19, 2011<br />
  16. 16. 12<br />Correlate across silos<br />Apply analytics <br />Deliver intelligenceinto the right hands<br />Monitor status<br />Report success<br />Closed Loop Process<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />February 19, 2011<br />
  17. 17. 13<br />Correlate across silos<br />Apply analytics <br />Deliver intelligenceinto the right hands<br />Monitor status<br />Report success<br />Closed Loop Process<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />February 19, 2011<br />
  18. 18. Identity and Access Intelligence (IAI) <br />As a Cloud Service<br />For more information contact me<br />Alan Norquist<br />Founder and CEO<br />anorquist@veriphyr.com<br />www.Veriphyr.com<br />VERIPHYR PROPRIETARY AND CONFIDENTIAL<br />

×