The reliance on technological infrastructure by corporarate environments is increasing. As more IT flexibility, inteconectivity, mobility and agility is demanded, the systmes become more complex and potentially more vulnerable.
Protecting cmputer system assets, subject to this vulnerability and submitted to increasing internal and exteranl threats is the new security challenge for IT.
The best practices in IT security require the following:
- Formalization of safety policies
- Monitoring and Control
- Auditing of the controls and management of noncoformities
To ensure effective security management, it is important to implant and automate the best current practices (ISO 27001, ISO 27002, PCI, etc.). It is worth emphasizing:
- Identity and Access Management: automatic provisioning of users, management of the life cycle and polcy of passwords, access control based on profiles and automation of activities;
- Event and Security Information Management: collection, correlation and consolidation of information from the various data sources, ensuring response to security incidents and auditing of logs and transactions.
As well as these points Ícaro Technologies has also defined its own model of maturity for the management of information safety, influenced by the ITIL and COBIT models and supported by the practices of CMMi, ensuring constant evolution and cost reduction.
- Automation for the production of reports and evidence for audits
- Support for the enfocement of policies and security processes
- Automation of processes and controls
- Reduction of effort in the management of identities and audit processes
- Capacity of the security infrastructure to respond to attacks and return to a safe state
- Identification of vulnerable points and mitigation of risks
- 10+ successful projects (100% delivered)
- Single implantation process orientated towards solutions
- Commitment to results and the most suitable solutions
- 20+ IBM & BMC certifications
- Investment and technical support from large manufacturers
The products integrated by Ícaro Technologies in Security Management are:
- IBM Tivoli Access Manager for Operating System (TAM OS)
- IBM Tivoli Access Manager for e-business (TAMeb)
- IBM Tivoli Access Manager for ESSO (TAMESSO)
- IBM Tivoli Identity Manager (TIM)
- IBM Tivoli Compliance Insight Manager (TCIM)
- IBM Tivoli Security Information and Event Manager (TSIEM)
- BMC Identity Management Platform