Page 14 - Cyber Defense Magazine - Global Print Edition 2018
P. 14

They also monitor the access and location, deprovision access  I’m proud of the holistic and dynamic approach we take to
        when it’s not needed and govern other changes in the access  Identity Services. Our “Pillars of Identity” perspective is more
        of your users. The key is visibility and governance An oft-  than a slogan. We offer a set of services that apply across each
        cited example is the well-meaning but dangerous employee  pillar:
        behavior of provisioning and running unknown applications   •  Assessment
        in the cloud; while they may be trying to be innovative, create      o  Process Review
        shortcuts or add functionality to the company’s operations,      o  Business Requirements
        they may in fact introduce incompatible programs, new      o  Strategy & Roadmap Planning
        vulnerabilities, and unnecessary access to systems. By
        creating a culture around access, its importance, least   •  Design
        privilege and identity controls, you can create a well-rounded      o  Identity Solution Architecture
        identity program.
                                                                 o  Access Governance Framework
                                                                 o  Single Sign On (SSO) Framework
        Professionals engaged in Identity & Access Management      o  Role Mining, Modeling & Engineering
        programs have recognized that the one of the fastest      o  Cloud Identity Security
        growing unmanaged risks to the integrity and confidentiality      o  Privileged Access Framework
        of sensitive company information is excessive employee
        access.  Beyond the internal storage of such data, such   •  Deployment
        facilities as mobile devices, cloud storage, growth of the      o  Solution Install & Configuration
        Internet of Things, and IT consumerization offer rich targets      o  Solution Deployment Supporting
        for increasingly sophisticated cyber-attacks.
                                                                 o  Testing & Validation
                                                                 o  Production Migration
        Following the instincts of our CEO, Robert Herjavec,      o  Integration opportunities to maximize technology
        the visionary founder of Herjavec Group (HG) (link to      o  investment – SIEM, DLP, endpoint
        herjavecgroup.com), the company took the lead in addressing
        the challenges posed by developments in the world of   •  Managed Identity Services
        Identity.  Since its acquisition of Aikya Security Solutions in      o  24x7 IAM Platform Monitoring
        2016, HG has built on this base of experience and expertise to      o  Basic and enhanced configuration support
        become a leading provider of Identity services.
                                                                 o  Onboarding services to automate and
                                                                 o  operationalize provisioning & de-provisioning
        At Herjavec Group we believe in supporting what we view as
        the 4 pillars of identity (link to https://www.herjavecgroup.  If you haven’t begun to consider Identity Services as part of
        com/services/identity-services/):
                                                             your security framework, know this – your business may be
                                                             scalable and running more efficiently through the cloud but
        1.  Identity Governance & Administration             you’ve opened the door to a new world of exploitation and
        2.  Privileged Access Management                     data theft.  Isn’t it time you considered Identity?
        3.  Access Controls
        4.  Identity Managed Services


        Identity programs are highly complex and traditionally
        difficult to implement at scale.  We’re here to relieve the   About the Author
        burden of integrating this layer of protection into your overall
        company security posture.  The net effect of HG’s Identity   Lewie Dunsworth  is Senior
        approach is  to lead a client through  the identity, access   Vice President of Professional
        and management journey. It starts with defining a custom   Services & CISO at Herjavec
                                                               Group, bringing more than 17
        strategy based on your specific needs, designing a solution   years of information security
        that  marries  together  people,  process,  technology,  and  of   experience to  the role. Prior
        course the deployment of technical solutions that meet your   to Herjavec Group, Lewie held
                                                               executive roles as the CISO
        specific requirements. You’ve also got to ensure in house or   at H&R Block and the SVP of
        external expertise and scale to manage the environment. The   Advisory Services & Managed
        objective is to streamline your processes, improve end-user   Services at Optiv. His business-
        experience, enhance security and enable compliance.    forward  approach  helps
                                                               companies create a balanced
                                                               strategy and effective security program, to adequately protect their most
                                                               critical assets. He earned his Bachelor of Science degree in Network and
                                                               Communications Management from DeVry University and a Master of
                                                               Business  Administration,  Executive  from  the  University  of  Missouri  in
                                                               Kansas City. He is also a Certified Information Systems Security Professional
                                                               (CISSP).  Learn more about Lewie at https://www.herjavecgroup.com/
                                                               about-us/executive-team/




        14 CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018  – SPONSORED BY TREND MICRO
   9   10   11   12   13   14   15   16   17   18   19