Learn About Identity and Access Management as a Strategic Business Driver at Pulse 2014
Today’s rapidly-changing, borderless business world and the mobile/cloud momentum are breaking down the traditional perimeter, forcing us to look at security differently. Maybe your firm is implementing new access policies and controls for mobile users, or you’re moving applications into the cloud. Or perhaps you’re opening up your enterprise to external users to exploit new business models. As cloud, mobile and other IT consumerization trends take hold, organizations must look beyond traditional Identity and Access Management (IAM) approaches and implement security solutions designed for current and emerging trends.
You need an threat-aware IAM strategy that helps you “think like an attacker“, ferreting out weaknesses and highlighting access anomalies so you can proactively address security vulnerabilities BEFORE disaster strikes. This approach positions your organization to better handle whatever the future brings while also addressing the latest security, privacy and compliance requirements.
As massive security breaches continue to make headlines, it’s clear that your organization’s security is only as strong as its weakest link – people. In order to protect the new extended enterprise, you need an IAM solution that centralizes policies and controls over people’s access while also providing visibility to “who has access to what” across all resources — both in the cloud and on-premises. A flexible, intelligent IAM solution becomes the key line of defense for the multi-perimeter organization and a powerful force for business improvement on several levels. With the right technology in place, you can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Fall Out Boy and Elvis Costello at Pulse Palooza 2014
Pulse Palooza talent announced
Have you registered yet for Pulse 2014? If not, what are you waiting for! Did you know that in addition to great networking, hearing from industry thought leaders and discovering how to use cloud as a growth engine for your business…you’re also invited to a private rock concert that will have you rockin’ the night away!
Imagine being entertained by not one, but TWO headline acts. First up, the Grammy-nominated band Fall Out Boy, fresh off of two sold-out tours for their #1 album, Save Rock and Roll.
Hailing from Chicago, Fall Out Boy—Patrick Stump (vocals/guitar), Pete Wentz (bass), Joe Trohman (guitar) and Andy Hurley (drums)—has appeared on the cover of Rolling Stone and other prestigious publications. They have performed on Saturday Night Live, The Today Show, America’s Got Talent, The Voice, Late Night with Jimmy Fallon, The Tonight Show with Jay Leno, Conan, The Late Show with David Letterman, Jimmy Kimmel Live and many more.
Up next? None other than the rock legend and icon, Elvis Costello! From the iconic “Pump It Up” to “Alison” to “Every Day I Write the Book,” every song is a hit…and instantly recognizable!
Elvis Costello has followed his musical curiosity in a career spanning more than 30 years. He is perhaps best known for his performances with The Attractions, The Imposters and for concert appearances with pianist Steve Nieve. However, he has also entered into acclaimed collaborations with Burt Bacharach, The Brodsky Quartet, Paul McCartney, Swedish mezzo-soprano Anne Sofie von Otter, guitarist Bill Frisell, composer Roy Nathanson, The Charles Mingus Orchestra, record producer and songwriter T Bone Burnett and Allen Toussaint.
So get pumped and get ready to rock – this is one evening you will not want to miss! And it all takes place in one of the great music venues in the country today: the MGM Grand Garden Arena.
- Tuesday, February 25th
- MGM Grand Garden Arena
- 7:00 p.m. – 10:00 p.m.
- Food and Beverages provided.
Note: Pulse Palooza is included in your purchase of a full conference pass, exhibitor pass, [email protected] pass, and Tuesday day pass. Additional guest passes can be purchased for $100 on-site during open registration hours. Cash payment will not be accepted.
IBM recognizes that the days of “old-style” IAM – with its focus on internal user provisioning and single sign-on to applications inside the firewall – are gone for good. IAM solutions now must manage resources in the datacenter and in the cloud, while delivering identity services to almost any device (such as desktops, tablets and smartphones) and keeping an eye on compliance requirements.
So this year’s Pulse Protect will introduce “the new face of IAM”, IBM Security IAM solutions redesigned to help deliver access services safely, efficiently and cost-effectively to internal and external users within security and compliance guidelines. Our new Threat-Aware IAM solutions deliver intelligent identity and access assurance and assist clients to prevent insider threats and identity fraud, safeguard cloud, mobile and social interactions, and simplify identity silos and cloud integrations. The solutions provide a key line of defense of the enterprise’s multiple perimeters.
Learn from great sessions
As always, the best spokespeople are our clients, who’ll explain in their own words how IBM IAM solutions help them address not only their security but their business challenges. These organizations will discuss how their IAM infrastructure has opened new doors of opportunity by strengthening security and supporting their business goals.
Click here to learn more about Pulse 2014 Conference
For example, join Session #IAM-1826 Extending Online Access for Today’s Business Needs to learn how WestJet, Canada’s most preferred airline, revamped their customer notification processes with IBM solutions. WestJet wanted to extend its thoughtful customer service, especially when flights must be cancelled or delayed, by sending personalized, rules-generated messages to customers via email or text. WestJet teamed with IBM to reinvent its travel notification processes and, as a result, dramatically improved customer satisfaction and business success.
Other clients, such as Whirlpool, Republic Services, and Getnet, will also share their stories on how IBM IAM solutions not only strengthened their security posture but supported new business initiatives. And our IBM experts and partners will discuss how you can benefit from our latest IAM solutions, including our ready-to-go access management appliances, redesigned Security Identity Manager UI, and our new Directory Services offerings.
Hands-on advice on IAM system optimization and integration, inspiring customer success stories, and insights from security pundits – you’ll find it all at the 2014 Pulse Protect event. Don’t miss it!
Check out even more sessions
Still not sure about attending Pulse? Check out all the different sessions in the Identity & Access Management: Enterprise, Mobile and Cloud track:
|BNSF Railway’s Move from Oracle/Sun to IBM Identity and Access Management
||How do you migrate 45,000 users to a new identity and access management platform after ten years of using a heavily customized Sun/Oracle Waveset IAM solution? Through careful and thorough analysis, a well-planned migration strategy, and the assistance of an experienced systems integrator, BNSF Railway successfully moved to the IBM IAM platform in a relatively short period of time. This project focused on migrating to a new IBM IAM suite of technologies without losing any of the capabilities that were developed in the Oracle/Waveset IAM products over a ten-year period. To reduce cost and shorten the timeline, a key priority was to implement the new system with minimal custom development using only “out-of-the-box” capabilities. Come listen to this compelling story of how one IBM customer achieved its goals using the IBM solution. Topics will include approach, challenges and best practices.
|Tips and Tricks for Successful IAM/SAP Integration
||The 40-year alliance between IBM and SAP has resulted in thousands of successful implementations, including mobile and cloud computing. This session covers one example: Whirlpool’s in-depth identity and access management and SAP integration project, which provides secure access to the company’s ERP system. Next, Ingo Dressler from IBM will discuss SAP integration points with IBM’s IAM products, including how to address the challenges of role-based access control and SAP authorization.
|Identity Governance and Administration: Where Do We Go Next?
||Over the past few years, organizations have invested in role management, identity governance, user provisioning and lifecycle management capabilities in order to gain control over users and their access to IT resources. Where do we go next with these investments? For example, over 80% of organizational information resides in unstructured data formats (Microsoft Office documents, etc). File systems and SharePoint farms have grown continuously over the past decade, and the distributed nature of unstructured data means that access has not been centrally managed. The end result is that we have no visibility into who has access to what, and how they’re getting access. In this panel session, we will explore organizational needs to improve visibility into all users and their entitlements, and to govern their access across applications and services. IBM, along with two Ready for IBM Security Intelligence partners, ILANTUS and STEALTHbits, will offer insights into how identity and access analytics are helping organizations govern users’ access to applications and even gain visibility into the world of unstructured data.
|Demonstrating Governance, Risk and Compliance on Your Mainframe
||Mainframes host mission-critical corporate information and production applications for many financial, healthcare, government and retail companies that require highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shutdown. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe? Learn how your modern mainframe can help you to comply with industry regulations, reduce costs and protect your enterprise while supporting cloud, mobile, social and big data environments.
|Mind the Gap: Bridging Online Access in Distributed Environments
||In strictly regulated industries, managing access rights and preferences for federated users, especially very large customer populations, while maintaining compliance can be daunting. We’ll discuss challenges associated with secure user authentication and authorization for critical online applications. Then, Mark Vanmaele of SecurIT, an IBM Security business partner, will describe how their TrustBuilder solution can aid in filling the gap with a federation hub using federation proxy and bridging functionality.
|Identity and Access Management for the Internet of Things… Are You Ready?
||Analysts predict that billions of devices will be connected to the “Internet of Things” by 2020, including web services and mobile devices. Security governance and access control will require innovation and out-of-the-box thinking. In this session, Getnet, a Brazilian financial services provider, will share their approach to physical access control and labor hour enforcement integration with the IAM platform. Then Aruba Networks, an IBM Business Partner, will discuss how their ClearPass Network Access Management solution integrated with IBM Security Access Manager for Mobile helps rein in the complexity of BYOD and mobile access. The integration provides end-to-end control, from devices joining the network, gaining single sign-on into the web environment and then accessing web resources. This aids integration with Mobile Device Management (MDM) systems (e.g., FiberLink’s Maas360), enhancing web resource access risk decisions by including additional device posture-specific attributes.
|Integrating Identity Management with Cloud Applications
||Wondering what organizations are doing with identify integration to/from the cloud? Cloud identities are incredibly multi-faceted. Organizations are using open, standards-based methods to provision, single sign-on (SSO) and govern user access to enterprise and SaaS applications. Cloud Service Providers are embarking on offering APIs to help developers build and deploy SaaS. Many organizations are maturing the adoption of IAM as a hosted service. This interactive session will provide key insights into the three common entry points to using identity as a key security control for cloud integration. Lighthouse Security Group, an IBM Security Business Partner, will share their experiences provisioning users to access commercial SaaS (Google Apps). IBM will share experiences offering cloud infrastructure using SoftLayer and SSO to SaaS (e.g., Microsoft Office 365).
|Extending Online Access for Today’s Business Needs
||When is identity and access management more than just a security solution? When it helps simplify operations, enable business process and drive increased revenue. In this panel discussion, Kevin Minshull, Solution Architect at WestJet Airlines, discusses the airline’s mobile rollout strategy based on integrating IBM WebSphere solutions, including DataPower and API Management. Then Patrick Wardrop, IBM Security Solution Architect, and Jason Keeneghan, IBM Security Access Product Manager, will explain how WebSphere DataPower can combine with IBM Security Access Manager to build security gateways that protect web, mobile, and API traffic and support new business models.
|IBM Security Identity Manager WebServices and Directory Integrator
||Are you stuck with the default GUIs provided with IBM Security Identity Manager (ISIM) for data entry and control? Absolutely not! This session shows a hands-on approach and examples of how to leverage the new ISIM WebServices using Security Directory Integrator (SDI) to perform common ISIM tasks. It will demonstrate the methods and steps needed to create this additional ISIM interface. Additionally, this presentation will talk about the new WebServices, and provide an overview of the functions that are available to you. Lastly, it will demonstrate integration with third-party tools and the integration with IBM Tivoli Directory Integrator (TDI).
|Fighting Insider Threats with Privileged Identity Management
||IBM Security Privileged Identity Manager secures, automates and audits the use of privileged identities to help thwart insider attacks and improve security. Martin Schmidt from IBM will explain how existing Tivoli Identity Manager clients can effectively add the solution to their existing environment without a wholesale upgrade to IBM Security Identity Manager, benefiting from improved control over privileged and shared accounts. Learn how to prevent insider threats and identity fraud with Security Privileged Identity Manager.
|Threat-Aware Identity and Access Management for a Multi-Perimeter World
||In today’s open and interconnected enterprise, traditional perimeters are being extended to encompass mobile, cloud, social access and information interactions. To make matters worse, many organizations face the growing cost and risk of managing multiple identity and access controls without the required security intelligence to address those challenges. They need the ability to secure identity and access across the wide variety of enterprise and internet resources from any device, any service and any source. Join IBM in this session to review the next generation access and identity management needs and the solution patterns available today to enable rapid adoption of mobile, cloud, and social transformation.
|2020 Vision: Identity and Access Management for the Next Decade
||One of the fastest-growing companies in the world, Cognizant has over 50 delivery centers worldwide and over 160,000 employees. In this session, William Doyle, Cognizant Associate Vice President Security, Legal and Risk Systems, will discuss how Cognizant provides its users—including employees, vendors, and customers—with protected access within the IBM Security Identity Management framework, and how they are adapting to ongoing security requirements. Then Sridhar Muppidi, Chief Technology Officer for IBM Security, will discuss the future of identity and access management and how IBM’s threat-aware IAM solutions will address emerging security needs.
|Enhance Your Identity and Access Management Solution with Integrations from Key IBM Technology Partners
||Join a panel of IBM technology partners to learn about new and exciting Identity and Access Management (IAM) integrations that have been validated through the Ready for IBM Security Intelligence program. IBM technology partners Aruba Networks, Prolifics, OnWire Consulting Group, and SafeNet will discuss how their integrations with key areas of the IBM Security portfolio increase solution value for customers. The panel discussion will cover strong authentication, mobile, cloud, and security intelligence use cases.
|Secure Mobile Transactions: Weakest Link or Safest Bet?
||The widespread adoption of mobile computing is forcing organizations to find new ways to secure mobile access for their customers and employees. However, instead of being the weakest link in network defenses, could mobile technology actually be more secure than traditional computing by 2014? Secure mobile transactions are a key part of enabling both client interaction with your business, and a mobile workforce. This involves understanding the risks involved in providing mobile access to business-critical resources, and how to innovatively manage that risk to allow differentiated mobile access to applications and data. Such a graded trust model could be based on device risk, user trust or transactional context. This spans both employee access in BYOD scenarios, as well as consumer access to enterprise apps. This session will discuss these patterns and describe a solution approach using Trusteer and IBM Security Access Manager for Mobile.
|Identity Management and Analytics
||Sit down with one of IBM’s identity management experts to discuss best practices and strategies for management of users, including privileged users, roles and rights.
||Join this session for an interactive discussion on providing secure access and authenticating users; and enforcing proactive access policies on cloud, social and mobile collaboration channels.
||Join us for an informal discussion on how to enhance the efficiency and manageability of mainframe platforms, where many of your organization’s mission-critical applications, production systems, and classified business data reside.
|Adding Big Brother to IBM Security Identity Manager
||IBM Security Identity Manager provides complete identity management and enterprise single sign-on capabilities for privileged users. But the fact is that many companies don’t know what privileged users are actually doing once they access company servers. The fast-growing trend of session activity recording is addressing this need. By recording keyword-searchable video and activity logs of every user action on every server, an entirely new level of IT security and compliance is possible. Join us as we discuss how Fortune 500 companies and other enterprises are adding “big brother” session recording capabilities to their networks in order to capture video of all on-screen activity performed by internal privileged users and remote vendors accessing Windows and Unix/Linux servers. We’ll discuss how adding a keyword-searchable session recording subsystem to IBM Security Identity Manager can help prevent security breaches, speed forensic investigations and ease regulatory compliance.
|Keeping The Skies Clear: Intelligently Monitoring & Protecting IT Assets across the Cloud
||We often speak of the migration from physical servers, to virtualization, to hybrid cloud deployments, to moving fully into the public cloud. But the reality is that we are using all of these technologies to enable business today. It’s this mix of environments that presents a significant security challenge. How can we ensure that we have the appropriate level of security controls active in each environment? Do we have enough visibility in each of these environments so we can fall in line with various compliance frameworks? Do we have enough insight to optimize operations, or to stop today’s advanced threats? In this session, we’ll discuss how can we leverage the tools we have at hand today to address these challenges. We’ll explore–based on recent advancements and real world experience–where these tools are heading in the next few years.