Page 14 - Cyber Defense Magazine - Global Print Edition 2018
P. 14
They also monitor the access and location, deprovision access I’m proud of the holistic and dynamic approach we take to
when it’s not needed and govern other changes in the access Identity Services. Our “Pillars of Identity” perspective is more
of your users. The key is visibility and governance An oft- than a slogan. We offer a set of services that apply across each
cited example is the well-meaning but dangerous employee pillar:
behavior of provisioning and running unknown applications • Assessment
in the cloud; while they may be trying to be innovative, create o Process Review
shortcuts or add functionality to the company’s operations, o Business Requirements
they may in fact introduce incompatible programs, new o Strategy & Roadmap Planning
vulnerabilities, and unnecessary access to systems. By
creating a culture around access, its importance, least • Design
privilege and identity controls, you can create a well-rounded o Identity Solution Architecture
identity program.
o Access Governance Framework
o Single Sign On (SSO) Framework
Professionals engaged in Identity & Access Management o Role Mining, Modeling & Engineering
programs have recognized that the one of the fastest o Cloud Identity Security
growing unmanaged risks to the integrity and confidentiality o Privileged Access Framework
of sensitive company information is excessive employee
access. Beyond the internal storage of such data, such • Deployment
facilities as mobile devices, cloud storage, growth of the o Solution Install & Configuration
Internet of Things, and IT consumerization offer rich targets o Solution Deployment Supporting
for increasingly sophisticated cyber-attacks.
o Testing & Validation
o Production Migration
Following the instincts of our CEO, Robert Herjavec, o Integration opportunities to maximize technology
the visionary founder of Herjavec Group (HG) (link to o investment – SIEM, DLP, endpoint
herjavecgroup.com), the company took the lead in addressing
the challenges posed by developments in the world of • Managed Identity Services
Identity. Since its acquisition of Aikya Security Solutions in o 24x7 IAM Platform Monitoring
2016, HG has built on this base of experience and expertise to o Basic and enhanced configuration support
become a leading provider of Identity services.
o Onboarding services to automate and
o operationalize provisioning & de-provisioning
At Herjavec Group we believe in supporting what we view as
the 4 pillars of identity (link to https://www.herjavecgroup. If you haven’t begun to consider Identity Services as part of
com/services/identity-services/):
your security framework, know this – your business may be
scalable and running more efficiently through the cloud but
1. Identity Governance & Administration you’ve opened the door to a new world of exploitation and
2. Privileged Access Management data theft. Isn’t it time you considered Identity?
3. Access Controls
4. Identity Managed Services
Identity programs are highly complex and traditionally
difficult to implement at scale. We’re here to relieve the About the Author
burden of integrating this layer of protection into your overall
company security posture. The net effect of HG’s Identity Lewie Dunsworth is Senior
approach is to lead a client through the identity, access Vice President of Professional
and management journey. It starts with defining a custom Services & CISO at Herjavec
Group, bringing more than 17
strategy based on your specific needs, designing a solution years of information security
that marries together people, process, technology, and of experience to the role. Prior
course the deployment of technical solutions that meet your to Herjavec Group, Lewie held
executive roles as the CISO
specific requirements. You’ve also got to ensure in house or at H&R Block and the SVP of
external expertise and scale to manage the environment. The Advisory Services & Managed
objective is to streamline your processes, improve end-user Services at Optiv. His business-
experience, enhance security and enable compliance. forward approach helps
companies create a balanced
strategy and effective security program, to adequately protect their most
critical assets. He earned his Bachelor of Science degree in Network and
Communications Management from DeVry University and a Master of
Business Administration, Executive from the University of Missouri in
Kansas City. He is also a Certified Information Systems Security Professional
(CISSP). Learn more about Lewie at https://www.herjavecgroup.com/
about-us/executive-team/
14 CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018 – SPONSORED BY TREND MICRO