Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

9/29/2015
10:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dell Reveals Enhanced Identity & Access Management Solution

New release delivers an even more modular and scalable approach to identity and access management enabling organizations to leverage current technology and infrastructure investments

ROUND ROCK, Texas, Sept. 22, 2015 – Dell today announced the release of Dell One Identity Manager 7.0, a scalable, modular and integrated platform that enables organizations to unify security policies, meet compliance needs and achieve governance, while improving business agility both today and long term. The solution enables compliance through access control and segregation of duties, complete visibility, and control that’s driven by identity intelligence and business objectives.

With Dell One Identity Manager 7.0, organizations can take advantage of a single, consistent IAM strategy – based on business needs, not IT capabilities – and incorporate a modular and integrated solution onto their traditional IAM frameworks. Business users benefit from a new self-service feature to manage the identity lifecycle process more easily, which further reduces the burden on IT. In fact, with the solution’s automated architecture, organizations can simplify major identity and access management tasks to a faction of the time or expense of traditional framework solutions.

Dell One Identity Manager 7.0 takes the risk out of enterprise identity and access management

For years, IT departments have been solely responsible for all elements of an organization’s security strategy. The burden on IT is even greater when it comes to traditional IAM frameworks, which are expensive to build and time-consuming to implement and maintain. To meet different business unit needs, IT often works with a siloed set of narrowly-focused tools and security policies, relying on manual processes for enforcement. Multiple information silos not only increase the attack surface of the organization, they also can negatively impact user productivity. When users find security workarounds, the environment becomes even more vulnerable to risk from both inside and outside the organization.

Dell One Identity Manager simplifies identity and access management and facilitates better security decisions so organizations can control user and privileged access, govern identities, secure data, and reduce information silos and risk exposure. It also provides auditors with real-time governance reports detailing the resources in customer environments, who has access to them, and why that access was granted and terminated. New features in this release include:

  • Heatmaps, dashboards and reporting enhancements

o   Increased definition and representation of heatmaps, dashboards and compliance reports

o   Resolve policy violations quickly, with better visibility through web UI for business users, data stewards and administrative staff

  • New ReST Architecture

o   Facilitates the exchange of information among an organization’s internal software and systems as well as external party systems

o   Increases security between components and enables customers to author their own user interface for particular tasks to better leverage company business processes

  • Web UI extensibility with HTML 5 support

o   Web UI split in three ways for extensibility and simplification: end user, governance, administrator

o   Increases business agility and responsiveness, regardless of the connected device

  • Provisioning and synchronization wizard

o   Provides easy, wizard-driven, centralized synchronization client to simplify the testing and provisioning to target systems

o   Decreases the time needed to provision a new user into the network

  • Componentization of core components

o   Simplifies installation

o   Reduces costs and upgrade complexities

  • Segregation of Duties definition enhancements

o   Provide easy definition and performance enhancements to SoD rule definitions

o   Reduce administrative time, while maintaining a higher level of compliance

 

Availability:

  • Dell solutions are available both directly and through channel partners.

Supporting Quotes:

John Milburn, executive director, Dell Security

“Organizations consistently feel daunted when it comes to implementing an identity and access management solution, as traditional frameworks are costly and time-intensive to deploy. Dell One Identity Manager 7.0 is a modular and integrated identity and access management solution, so organizations can deploy what they need today, and feel confident they can easily add elements as required to support future business needs. With built-in automation and scalability to improve business agility, today and in the future, Dell One Identity Manager enables organizations to effectively mitigate risk, unify security policies, meet compliance needs and achieve governance – all without impacting business productivity.”

Mike Jones, director, Intragen

“The new release of Dell One Identity Manager sees a significant evolution for the product, and Intragen looks forward to delivering even greater value, functionality and scalability to our customers more quickly and easily than ever before. By deploying Dell solutions, we are able to identify, quantify and address the diverse range of risks our customers face by providing the appropriate governance to keep critical data and systems secure. Our customers increasingly view Dell One Identity Manager as a business enabler, because the solution gives them the visibility, automation and control they need to provide more services to more markets without compromising security.”

Supporting Resources:

About Dell

Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Dell World

Join us Oct. 20-22 at Dell World 2015, Dell’s flagship event bringing together technology and business professionals to network, share ideas and help co-create a better future. Learn more at www.dellworld.com and follow #DellWorld on Twitter.

Tweet This:  .@Dell releases modular, integrated solution that takes the risk out of enterprise IAM: http://dell.to/1KFWHpZ

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.