THE SECURITY PARTNERS SALES PLAYBOOK TECH DATA IDENTITY and ACCESS MANAGEMENT SALES TOOLKIT Content © Outsource Channel Executives, Inc., All Rights Reserved

THE SECURITY PARTNERS SALES PLAYBOOK TECH DATA IDENTITY and ACCESS MANAGEMENT SALES TOOLKIT Content © Outsource Channel Executives, Inc., All Rights Reserved

THE SECURITY PARTNERS SALES PLAYBOOK TECH DATA IDENTITY AND ACCESS MANAGEMENT SALES TOOLKIT Content © Outsource Channel Executives, Inc., All rights reserved. Licensed to Tech Data, Inc. OCEinc.com Author: Mark S.A. Smith, OCE, Inc. OCE Project Manager: Molly Smith, OCE, Inc. Disclaimer Printed in the USA Neither the author nor the publisher assumes V2.0 any responsibility for errors, inaccuracies, or concerning business practices may have omissions. Any slights of people or organizations inadvertently introduced practices deemed are unintentional. unlawful in certain states, municipalities, or This publication is not intended for use as a countries. You should be aware of the various source of security, technical, legal, accounting, laws governing your business practices in your financial, or other professional advice. If advice particular industry and in your location. concerning these matters is needed, seek Any websites referenced were personally the services of a qualified professional as this reviewed by the author; there are no guarantees information is not a substitute for professional to their safety. Practice safe Internet surfing with counsel. Neither the author nor the publisher current antivirus software and a browser with accepts any responsibility or liability for your use active security settings. of the ideas presented herein. All trademarks and registered trademarks are the Some suggestions made in this document property of their respective holders. SECURITY SOLUTIONS PLAYBOOK | 3 Contents Security Token .........................................................9 Exploring the Identity and Access Tech Data Identity and Access Management Controlling the Keys ...........................................10 Management ...............................................................16 Sales Toolkit: How to Build Security Something You Are .............................................10 Qualifying Questions for Application Offerings into Your Practice .................................5 Authorization .........................................................10 and Data Security ................................................16 How to Use this Toolkit ...........................................5 Accounting ............................................................... 11 Aligning with Your Client’s Motivation ......16 What is Identity and AAA Servers ............................................................ 11 Illustrating Compelling Value of Identity and Access Management ................................. 17 Access Management? ..............................................5 The Identity and Access Management Authentication.........................................................6 Market Opportunity ................................................. 11 Closing the Deal ................................................... 17 Something You Know ..........................................6 Business Drivers ................................................... 12 Expanding the Identity and Access .......... 17 Passwords ..................................................................6 Technology Drivers ............................................. 12 Management Opportunity ............................... 17 Internal and External Passwords ....................6 Future Trends ......................................................... 13 Likely Cross-sell and Upsell Options .......... 18 Complex Passwords .............................................7 How to Identify Likely Prospects for Create Memorable Complex Passwords .....7 Identity and Access Management ................... 13 Simple Passwords ..................................................7 Who to Talk With: Getting to the Password Policy ......................................................8 Decision-making Team ...................................... 13 Single Sign-on .........................................................8 Suggested Introduction Email .......................14 Something You Have ............................................9 Suggested Voicemail Script ...........................14 Two-factor Authentication ................................9 Managing Common Objections .................... 15 4 | SECURITY SOLUTIONS PLAYBOOK Tech Data Identity and Access Management Sales Toolkit: How to build security offerings into can use to connect with your customer can help you find a solution. Please call us if your practice and illustrate that you know what you’re you can’t find what you’re looking for in this Welcome to the Tech Data Identity and doing when it comes to identity and access sales toolkit. management. Access Management Sales Toolkit. As you Review the table of contents and then scan expand your security practice beyond through this document looking for what’s providing basic security management such How to Use this Toolkit most interesting to you. By doing this you’ll as email and Web threats, you’ll find this If you’re new to identity and access rapidly identify content that’s new without guide to be useful in dealing with more management solutions, this guide is a great wasting a lot of time reading every word. extensive security issues. place to start. As you review this material, identify what This guide contains lots of ideas that you If you’ve been selling identity and access you want to share with your staff and clients management, use this document to make to help them have a more successful and sure that you’re covering all the bases. Most secure operation. Doing this lets you get the likely there are new ideas in this toolkit that most out of your time with the sales toolkit. you can use to enhance your practice. While it’s impossible to cover every aspect of identity and access management in this sales What is Identity kit, Tech Data has a wide range of resources and Access Management? that can help you solve your clients’ This guide reviews how to manage access problems. With staff subject matter experts to your customers’ sensitive and valuable and contact with top industry experts, we corporate data. Identity and Access SECURITY SOLUTIONS PLAYBOOK | 5 Management combines three elements— only an authorized person can answer. • It being observed as it was typed in Authentication, Authorization, and For example, financial institutions ask for (called shoulder surfing) Accounting—collectively called AAA. Let’s your Social Security number, your mother’s • Being found on a cheat sheet near take an in-depth look at these three areas. maiden name, or a Personal Identification the computer Number (PIN). With the proliferation of social • Being discovered by attackers with Authentication media and online sites for many people, a dictionary attack or brute force attack 3 The first step to access control is verifying these specific pieces of information can be an individual’s identity; that a person is who found with a quick search. A recent survey Internal and External Passwords they claim to be. If an attacker can’t get past of hacked PINs found that the 20 most When you access external systems or the authentication system, they can’t frequently used PINs cover 26.8 percent of websites, your user name and password are all access codes. 1 do damage. often open to interception. For this reason, Authenticate by confirming something create policy to always use different user Passwords you know such as a lock combination or a names and passwords for internal systems Your first line of defense against password, something you have such as a key that are never used with external systems. unauthorized access is a combination or ID card, or something you are or do such Other security experts recommend three of user names and passwords, allowing as physical attributes or behaviors. levels of user name and password security: authentication of individuals and providing a one combination for highly sensitive internal rudimentary level of non-repudiation. 2 Something You Know access, a second combination for offsite Passwords can be defeated by: A password is the oldest and simplest way to sensitive sites, and a third combination for • A person disclosing to another their user identify friend or foe; just ask a question that sites with limited sensitivity. name and password 1 http://www.howtogeek.com/125378/the-most-common-and-least-used-4-digit-pin-numbers-security-analysis-report/ 2 Non-repudiation means that you can’t say it wasn’t you that logged on with that combination. 3 Widely-available tools such as crack and 11oft attempt to bypass login systems by trying frequently-used passwords from a dictionary, then resort to brute force by trying all other letter and number combinations. 6 | SECURITY SOLUTIONS PLAYBOOK Complex Passwords While they’re complicated to crack, Create Memorable Complex Complex passwords are created by mixing passwords like this can be unreasonable for Passwords upper and lower case characters, numbers, users to remember. Each month, about 30 You can create a complex password by using and special characters to create a password percent 5 of passwords are forgotten and the first letter of each word in a memorable that can’t be found in a dictionary (like manually reset by help desk personnel, with sentence. For example, “I love to ski and dive o0iCu812).4 An eight-character password the greatest number on Mondays and after a but not at the same time,” yields like this generates 6,095 trillion possible holiday. Il2s&dbN@tst. 6 combinations; you’re pretty safe unless the If users can’t remember passwords, then You can also create

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    96 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us