1 / 40

E-security : E-business Enabler

A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together. E-security : E-business Enabler. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management

eara
Télécharger la présentation

E-security : E-business Enabler

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  2. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  3. from to Protect against Technology Threats (Intruders, Hackers..) Open up new business opportunities A shift in perspective Role of Security:

  4. A shift in perspective Security, an e-business imperative: The concept of security as a strategic performance-driving business process is just beginning to gain a foothold among some forward-thinking executives. It’s too apparent that patching together a collection of point solutions will continue to burden their companies with an increasingly fragmented security architecture. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  5. A shift in perspective Security, an e-business imperative: “With the sheer volume and complexity available in IT solutions today, it is now more critical than ever that executives and managers understand how to establish security and controls that deliver real value across their enterprise. As a first strategic step in this direction, one key factor that business and IT executives have to realize is that securing your business is not about the technology you choose. It’s fundamentally about the issues and objectives driving your business. For business leaders to derive real value from security, they have to align security processes with their business objectives. When you come at it from the angle of enabling your business, you’ll deploy security solutions that succeed.” Chris King, META Group The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  6. A shift in perspective The Security of Exclusion The Security of Exclusion represents the business imperative that your organization’s information assets must be protected to ensure integrity, privacy and reliability. This implies that opening the infrastructure to unlimited collaboration is unacceptable, and that safeguards must be established to ensure that a breach does not occur. The Security of Inclusion The Security of Inclusion represents the business imperative that the right people – including customers, suppliers, partners and workforce – require controlled access to the right resources. This not only implies access, but also controlled processes and a security infrastructure that is available to fully enable the business. This means that establishing an impenetrable perimeter is no longer a viable security strategy. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  7. Internal Focus Access granted to employees only External Focus Suppliers, customers and prospects all need some kind of access Centralized Assets Applications and data are centralized in fortified IT bunkers Distributed Assets Applications and data are distributed across servers, locations, business units Prevent Losses The goal of security is to prevent against confidentiality breaches Generate Revenue The goal of security is to enable E-Business IT Control Security manager decides who gets access Business Control Business units want the authority to grant access A shift in perspective

  8. A shift in perspective

  9. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  10. A Methodology For Implementation The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’ The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  11. WHAT IS THE ENGINEER STAGE? The set of tasks that collectively Create your security’s value. These tasks transform your security strategy into the organization, process and technology required to balance the need to be inclusive with the obligation to protect your critical business assets and infrastructure. WHAT IS THE ENVISION STAGE? The set of tasks that collectively Identify your security’s value. These tasks help your enterprise determine the types and degree of security measures and technologies required to meet your unique business objectives. SUPPORTING CAPABILITIES: Between each primary activity are connecting Integration Touch Points, that serve as bridges between primary activities – bridges that ensure that the value transfer from Envision through Respond is in alignment with the business objectives and the supporting capabilities. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  12. WHAT IS THE OPERATE STAGE? The set of tasks that collectively Capture your security’s value through managing security, privacy and process controls on a day-to-day basis. WHAT IS THE RESPOND STAGE? The set of tasks that collectively Sustain your security’s value. These tasks help to ensure your ability to react swiftly to security crises in order to reduce the impact of an incident, stabilize the operating environment, return quickly to normal operations and facilitate any appropriate legal recourse. HOW ARE THESE STAGES INTEGRATED? In order to fully harvest security’s value, a company must consistently Envision components of Engineer, Operate and Respond; Engineer components of Operate and Respond; Operate securely on a continuous basis and Respond to incidents. After which, a return to Envision, Engineer and Operate is in order. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’

  13. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  14. IBM IPv6: An e-business Enabler

  15. IBM IPv6: An e-business Enabler

  16. IBM IPv6: An e-business Enabler

  17. IBM IPv6: An e-business Enabler

  18. IBM IPv6: An e-business Enabler

  19. IBM IPv6: An e-business Enabler

  20. IBM IPv6: An e-business Enabler

  21. IBM IPv6: An e-business Enabler

  22. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  23. What is Identity Management ? IM is a convergence of technologies and business processes that must reflect the specific requirements within an organization OpenNetwork

  24. User account logins User access permissions Security enforcement On-going management Auditing What is Identity Management ? OpenNetwork

  25. Security: External and Internal Increased Convenience and Productivity Cost Savings Why Identity Management? OpenNetwork

  26. Users Partners Employees Suppliers Customers HR System Desktop login Email File/Print Employee Intranet Sales Intranet Extranet; Billing, inventory Support Extranet; Sales and Marketing, Support Pricing,billing, inventory Internet; Sales and Marketing Ordering Support Applications The Challenge OpenNetwork

  27. The Big Picture OpenNetwork

  28. The Big Problem Risk / Lack of Control Administrative Burden Duplicative Spending Time to Market Complexity and Cost OpenNetwork Users and Applications

  29. The Solution End-to-End Identity Management OpenNetwork

  30. Centralized security – common platform for user identities and security policies Decentralized management Multi-platform support Scale; deployability Role-based access control Standardized application security Platform Requirements OpenNetwork

  31. Web IdM Access control Web SSO Self-service Self-registration Delegated administration Auditing and reporting Enterprise IdM Account Management Enterprise SSO Password management and synchronization Auditing and reporting End-to-End Identity Management OpenNetwork

  32. Better overall security Faster application development/deployment Reduced administrative burden Fewer user accounts to manage Centralized account creation and deletion Delegation Operational cost savings Ultimately, federation with similar infrastructures or partner networks Advantages OpenNetwork

  33. Leverages existing infrastructure investment Eliminates duplicative spending Delivers rapid ROI Non-intrusive architecture and flexible deployment options reduce deployment risk Extends easily and quickly Migration plan to Web services, federation… Offers proven best practices and implementation methodologies The Business Case Improves security, management, time to market, productivity PLUS OpenNetwork

  34. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  35. Business Continuity Management Business Continuity Risk Management Disaster Recovery Facilities Management Supply Chain Management Quality Management Health & Safety Knowledge Management Emergency Management Security Crisis Communications & PR Business Continuity Institute

  36. Business Continuity Business Continuity Institute

  37. Business Continuity Business Continuity Institute

  38. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler

  39. Putting it All Together… VigilEnt Integrated Security Management

  40. Putting it All Together… VigilEnt Integrated Security Management

More Related