1 / 1

4. Identity and Access Management

4. Identity and Access Management. NAC. TrustSec. Challenge : Create an open environment for collaboration with contractors, partners and guests while maintaining the required policy and regulatory compliance for access to information Solution :

mandek
Télécharger la présentation

4. Identity and Access Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 4. Identity and Access Management NAC TrustSec Challenge: Create an open environment for collaboration with contractors, partners and guests while maintaining the required policy and regulatory compliance for access to information Solution: Cisco Network Privilege Framework (NPF), a framework that comprises Identity, Security (TrustSec) and Policy Compliance (NAC) Value: Meet security and privacy requirements Flexible and scalable service deployment Common policy framework across use cases Topology independent access control Integration with enterprise data stores Business Impact: <6 months Action Steps for Discussion: Explore fit of NPF solution with overall Shell security and identity infrastructure Discuss Shell architecture with Robert Gleichauf (Vice President Enterprise Services and Security Converged Policy • Role Based Access Control • Converged Policy Framework • Data Integrity/Confidentiality • Enforce policy compliance • Prevent unauthorized access • Audit, quarantine and remediation • Guest access • Device profiling • Flexible user/host authentication/authorization • Identity aware network Identity NPF provides feature enhancements, interlocked system development and GTM across each component

More Related