Escolar Documentos
Profissional Documentos
Cultura Documentos
CISO Briefing: How Security Can Enable Top IT Priorities for 2011
In this paper we explore how one key security technology, Enterprise Access Management, can play a pivotal role in enabling the CIO and the CISO to work together to achieve four of the top 10 goals.
The publication, InformationWeek, recently featured an article titled, Top 10 CIO Priorities and Issues for 2011, based on discussions with IT executives and their teams, tech vendors, LOB executives and academics. The priorities ranged from optimizing opportunities with optimized systems to creating a robust mobile strategy. While this article isnt necessarily the Top 10 list for CISOs, in reading through the priorities, it becomes clear that a lack of efficient and effective security capabilities will hinder the organizations ability to achieve these top priorities. In this paper we explore how one key security technology, Enterprise Access Management, can play a pivotal role in enabling the CIO and the CISO to work together to achieve four of the top 10 goals. Heres how and where enterprise access management comes into play:
CISO Briefing: How Security Can Enable Top IT Priorities for 2011
Can we implement both flexible authentication and authorization policies depending on the user, location, method used to access the device and time of day being accessed? Are we still relying on password vaulting or sudo to control privileged passwords? Does our identity management process include robust access control administration and enforcement? Do we have a common method for controlling authentication and authorization across our diverse applications? With robust enterprise access controls across diverse servers, applications, and desktops, you will enable your organization to securely grow the business globally.
CISO Briefing: How Security Can Enable Top IT Priorities for 2011
Questions related to optimizing security administration and audits that you should explore: Are your security administers able to provision and de-provision user accounts from across hundreds of diverse servers and multiple business applications in one step? Are your access controls seamlessly integrated with your identity management processes to automate provisioning and de-provisioning as much as possible? How much time are your administrators spending re-setting passwords? Are you still using inefficient password vaulting mechanisms? How much effort is being expended to produce audit reports related to access controls and security policies? Are user access activities and keystroke logs automatically consolidated from across diverse servers to automate audit reporting? Is this data automatically mapped to SOX, PCI, HIPAA, and NERC compliance requirements? An enterprise approach to access management will enable you to significantly streamline administration and automate compliance reporting, enabling your organization to shift more of the budget to innovation.
Conclusion
The CISO can play a key role helping the organization achieve their key IT initiatives and resolve their challenges. Leveraging the latest enterprise access management and security capabilities, you can provide leadership in the need to adapt and evolve the infrastructure, securely support the global enterprise, and streamline operations to support a shift towards innovation.
Copyright 2011 FoxT. All rights reserved. The document is provided for informational purposes only and the contents herein are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. The document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior permission. FoxT logo is a trademark of FoxT, Inc. Other product and company names herein may be registered trademarks and trademarks of their respective owners.
www.foxt.com 883 North Shoreline Blvd. Building D, Suite 210 Mountain View, CA 94043 USA 650.687.6300