[go: up one dir, main page]

0% found this document useful (0 votes)
83 views16 pages

Verify Identity Protection

learn

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views16 pages

Verify Identity Protection

learn

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

IBM Verify

Identity
Protection

1
Why Identity Fabric? Digital
Hybrid Adversarial
cloud transformation AI

IT modernization leaves Fragmented

organizations managing
Identity Silos

fragmented cloud and


Abandoned
Legacy Apps

legacy solutions Inconsistent


Security Policies
2

Inconsistent Elevated identity Expensive A simplified and


user experience risk and drift management
integrated identity
Different IAM solutions Disconnected identities Teams lack the ability and
have different capabilities, lead to a fragmented view budget to manage policy
strategy is needed
making consistent policy of user behavior across the and compliance across
and authentication enterprise and unintentional IAM stacks, abandoning
impossible access exposure protection for legacy apps

IBM Security
… leaving identity in hybrid environments complex and vulnerable

Fragmented
Hybrid cloud adoption
67% Identity Directories

Digital transformation of enterprises will use


three or more clouds
Single Sign On

Local Cloud
Directory

Abandoned
Legacy Apps
Modern SaaS
Identity
Solution

New Modern On Legacy


Apps Premise Apps
Legacy
Directory

Multifactor
Authentication

Inconsistent Microsoft
Amazon
Azure
Security Policies Modern SaaS
Cloud

Directory

Legacy Identity Pre-Production Local Cloud


Risk Based Solution Apps Identity Solution
Authentication
IBM Security 3
Managing the Identity Fabric
Identity Fabric
Fundamentals
Microsoft New Modern
1. Orchestrate integration Azure Apps

across existing identity


solutions Identity
Protection SOC
2. Consolidate identity silos Amazon Modern (ITDR/
Consolidated Modern SaaS Modern Multi Factor Cloud Apps ISPM)
3. Enable efficient risk-based Directory Identity Risk Based Authentication
Solution
authentication Authentication
Application
Gateway
4. Integrate legacy apps to
modern authentication
5. Ensure proper governance
across identities… Legacy Identity On Legacy
Solution Premise Apps
6. …including privileged users
7. Deliver actionable insights Orchestration of User and Security Journeys
across identity posture
and threats (Identity
Protection = ITDR + ISPM)

4
IBM Security
IBM VERIFY IDENTITY PROTECTION

“Hackers don’t break in, they login"


Protecting identity & identity systems across the Identity Fabric requires
in-depth insights leveraging ITDR & ISPM methodologies
Continuous identify security posture and threats detection

Discover Expose Detect


Security Blind Spots Infrastructure Gaps Risky Activity
Shadow assets, directories Dangerous identities Identify exposures, threats and
Unauthorized local accounts Misconfigurations and attacks in real-time with
MFA bypass hazardous deviations from detailed contextual analysis
Dormant service accounts security policy
New! IBM Verify
Identity Protection
A cloud-based solution that helps efficiently identify
and remediate identity posture issues and threats for
managed and unmanaged identities across multiload,
SaaS, and on-premises environments.

Over 70 detection logics


• Identity & Access Blind Spots
• Identity Infrastructure Exposures
• Risky Identity Accesses

Out-of-the-box connectors
• IBM Verify SaaS
• IBM Qradar
+ other market leading SIEM and IAM solutions Identity Now easy to discover &
Threats quick to remediate 6
IBM Verify Identity Protection:
Core Capabilities
Identity Security Identity Threat Identity Incident
Identity-Based Secure Privilege
Posture Detection & Investigation and
Zero Trust Access
Management (ISPM) Response (ITDR) Response

Gain visibility into all


Secure the identity
activity connected to Provide full identity Proactively plan what Know what to
infrastructure with
identities, assets and context to any to include in your include in your
the industry’s first
directories across any cyberthreat or Zero Trust solution privileged access
enterprise-level ITDR
cloud or platform. incident, allowing via full identity and solution, including
by monitoring ALL
This enables real- you to quickly access visibility. This service accounts and
your identity
time detection of determine all ensures there is no users. Be confident
infrastructure
identity-related blind identities involved authorized access that your privileged
solutions to
spots in your identity discover the “who, through your Zero access solution is
holistically detect
infrastructure as well what, when and Trust solution and continually doing its
identity threats,
as potentially where” surrounding that no one bypasses job, and nothing is
exposures and
dangerous the incident. it. slipping through.
vulnerabilities.
misconfigurations.
IBM Verify Identity Protection:
Top Use Cases

Identity Infrastructure Issues Identity Blind Spots Risky Identity Activity

MFA issues (e.g. bypass) Exposed Assets Bypass of ZTNA

Credential Hygiene Shadow Access (Local accounts) Bypass of VPN

Service Accounts Security Shadow Assets Bypass of PAM tools

Shadow Identity Systems


Suspected Attacks on Identity Systems (Directories, Password Managers, Key Suspicious access/identity activity
Managers)

Shadow SaaS Usage

Identity Observability – Who accesses what, when, and how…and how often
IBM Verify Identity Protection’s unique technology combines directory info with
real-time access streaming for continuous access protection.

DATA COLLECTION &


ENRICHMENT
DISCOVER Remediate/
API (Agentl ess ) / Fl ows (AI/ML) PREVENT

DIRECTORY/IdP

Map Deep Learn Response


Events Directories Risk
(Auth &
Assets, Flow, Access Map, Behaviors, Policies, Setting &
access Intelligence
Access) & user details feeds Construct Blind Spots… Configuration

FLOW ACTIVITY

Network flows SIEM/XDR Logs


(VPC, NetFlow, (SASE, VPN,
IPFIX, etc.) & Gateway)

CONTINUOUS ACCESS FLOW MAPPING


IBM Verify Identity Protection:
Flexible & Easy Deployment Options

CLOUD SIEM DEPLOYMENTS SIEM DEPLOYMENTS DIRECT DEPLOYMENTS

AP
I
AP
API

I
Secure Tunnel (HTTPS)
Secure Tunnel (HTTPS)
Cloud Infra Cloud IDPs
Cloud Infra Cloud IDPs Cloud Infra Cloud IDPs

Cloud SIEMs

O N - P R E M I S E O N - P R E M I S E O N - P R E M I S E

AD Sensor Flow Sensor


SIEMs Flow Sensor

Active Network On-Premise Active Network On-Premise Active Network On-Premise


Directory Access Network Directory Access Network Directory Access Network
Infra Infra Infra Infra Infra Infra
IBM Verify
Simplified hybrid identity transformation;
Delivering an effective AI-infused identity fabric with vendor agnostic Identity Orchestration

Complement
Existing Solutions
Maximize current
investments and strategic
choices

Simplify & Automate


Identity Modernization
Leverage a no-code/low-
code orchestration engine

Comprehensive and
Consistent Coverage
Improve security posture and
user experiences

IBM Security 11
Delivering the AI-infused Identity Fabric with IBM Verify
AI-infused consistent policy and operations across tools like Okta, Ping and SailPoint

Continuous Access Control

Single Sign-On and MFA Lifecycle management


1 Individual packaging
Adaptive access Privileged access Provide core capabilities
Workforce Identity Consumer Identity
Drive cloud modernization, Deliver on-demand, in individually packaged,
Privacy and consent management
technical agility and Passwordless authentication personalized, and vendor agnostic
user productivity trusted experiences
solutions*

2 Fill identity fabric gaps


Solutions Simplify the journey to
Access Management Identity and Governance Privileged Access Management
drive identity efficiency,
security and compliance,
with support for virtually
Risk Based Identity Protection
Capabilities Directory* Access Gateway*
Authentication* (ITDR + ISPM)
Orchestration unlimited scale

Lightweight
Provisioning SSO MFA Passwordless
Governance

* Available Stand-Alone or as part of platform


What’s Next Format: 3-hour interactive design thinking session, virtual or in-
person, facilitated by senior IBM security architects &
No-cost discovery and framing workshop consultants.

Focus: Workshop exercises help you identify gaps in your


identity governance, access control and privileged account
management capabilities.

Participants: Includes 5-7 participants such as security leaders,


security and enterprise architects, security analysts, and other
IT representatives from the data, application, and operational
areas of your organization.
Accelerate your security posture while protecting
your investments Deliverables: 1-2 weeks after the session, IBM will provide a
customized, client- confidential report that highlights the top
The Identity Fabric Framing & Discovery business priorities, critical capabilities and areas for
Workshop provides a collaborative review of your improvement in the form of a prioritized list of initiatives along
security program including a holistic analysis of with recommendations to increase security maturity and
people, processes, and technology to align mitigate risk.
stakeholders, understand your current security
landscape, and prioritize key initiatives to This no-cost session is a joint investment as part of IBM’s
partnership with your org. Learn more and sign up at:
mitigate risk. ibm.com/security/resources/workshop
Backup: IBM Portfolio for Managing the Identity Fabric
Identity Fabric
Fundamentals
Microsoft New Modern
1. Orchestrate integration Azure Apps

across existing identity


solutions Identity
Protection SOC
2. Consolidate identity silos Amazon Modern (ITDR/
Consolidated Modern SaaS Modern Multi Factor Cloud Apps ISPM)
3. Enable efficient risk-based Directory Identity Risk Based Authentication
Solution
authentication Authentication
Application
Gateway
4. Integrate legacy apps to
modern authentication
5. Ensure proper governance
across identities… Legacy Identity On Legacy
Solution Premise Apps
6. …including privileged users
7. Deliver actionable insights Orchestration of User and Security Journeys
across identity posture
and threats (Identity
Protection = ITDR + ISPM)

15
IBM Security
IBM Verify Identity Protection:
Core Capabilities

You might also like