Simplifying the Management Of Silos Of Identities

Ravi Srinivasan, Director, IBM Security Strategy and Product Management
1148
1869
353
Ravi Srinivasan, Director, IBM Security Strategy and Product Management

Ravi Srinivasan, Director, IBM Security Strategy and Product Management

There are three primary emerging challenges affecting the enterprise’s ability to demonstrate compliance and reduce the risk of security and audit exposures.

a) Business transformation with rapid adoption of Mobility/BYOD, Cloud/ SaaS and Social technologies – It’s hard to demonstrate compliance when the enterprise doesn’t own the device, not responsible for the infrastructure in the cloud, not managing the social identities to access enterprise resources. Organizations need security capabilities to safeguard the mobile, cloud and social interactions and improve visibility of the interactions and intelligence across the enterprise. IBM has evolved its security capabilities to provide a closed-loop Identity and Access Management with Security Intelligence.

b) Mergers and Acquisitions are increasing the complexity of driving regulatory compliance. What is acceptable to business in one country could be a regulatory violation is another. Organizations need to as a result simplify the management of silos of identities, enforce context-based access control and reporting audit and alerts across the silos of IT infrastructure (distributed, mainframe), data and application environments. IBM has enhanced its security capabilities to offer federated directory integration, distributed log management and compliance reporting against industry, government and company-specific regulatory policies.

c) Growing audit and security concerns with insiders. Many employees, partners, contractors are often given ‘backdoor’ access to assets and business critical applications and data, ‘sharing’ passwords to access them or using generic identities for IT integrations. Organizations need to prevent the resulting insider threat and identity fraud across the enterprise. IBM has evolved it capabilities to introduce Privileged Identity Management, enhanced Access management with threat awareness and added advanced fraud protection capabilities.

Creating a link with partners to make compliance work IBM works with a broad ecosystem of 3rd party ISVs, business partners and solution providers to integrate with IBM security capabilities to provide broader and deeper compliance insights for organizations of many types. IBM has an established program called “Ready for Security Intelligence” that enables partners to demonstrate, publish and promote their solutions to their target customer segment and market opportunities.

The Ready for IBM Security Intelligence initiative is dedicated to fostering a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. With Ready for IBM Security Intelligence, IBM is dedicating resources to collaborating with our Technology Partners to enable the integration and validation of their products and support go-to-market activities. Achieving Ready for IBM Security Intelligence validation shows clients that your product has been vetted against IBM technical specifications for interoperability, providing confidence in the solution. After you successfully complete the validation and marketing criteria, you can display the Ready for IBM Security Intelligence mark on your qualified offerings, participate in other go-to-market opportunities, and differentiate your offering from the competition. Working together we can design, develop, and deliver joint solutions to support the best threat protection and risk management capabilities for our mutual customers.

Read Also

Easing Compliance: Expanding an Ethical Culture Through Technology

Easing Compliance: Expanding an Ethical Culture Through Technology

Raphael Richmond, Global Director-Compliance, Ford Motor Company [NYSE: F]
Cybersecurity Risks and Why Internal Partnerships and Cross-Functional Resources Matter

Cybersecurity Risks and Why Internal Partnerships and Cross-Functional Resources Matter

Adrian Mebane, VP & Deputy General Counsel, The Hershey Company [NYSE: HSY]
Chief Compliance Officers And Cyber Security: A Match Made in the Boardroom

Chief Compliance Officers And Cyber Security: A Match Made in the Boardroom

Robert Garretson, GM, Governance Strategy, United States Steel Corporation
Avoid Non-Compliance by Getting Your SSH Keys under Control

Avoid Non-Compliance by Getting Your SSH Keys under Control

Fouad Khalil, Director of Compliance, SSH Communications Security