Værdien af Identity & Access Management, Jan Quach, Accenture

Uploaded on

Præsentation fra Smarter Business 2012

Præsentation fra Smarter Business 2012

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Identity & Access Management Jan Quach & Aditya Jayanthi Information Security ServicesCopyright © 2012 Accenture All rights reserved. 1
  • 2. Agenda• We are…• It all started…• Vision• Approach• Journey• So far, so good• What’s in it for youCopyright © 2012 Accenture All rights reserved. 2
  • 3. We are VELUX and Accenture
  • 4. The VELUX Group• Established in 1941• Approx. 10000 employees globally• 2600 in Denmark• Sales companies in almost 40 countries• Production companies in 11 countries• Head office in Hørsholm, Denmark• Owned by VKR Holding, a limited company wholly owned by foundations and family• VKR Holding turnover 17,8 billion. DKK in 2010.• One of the strongest global brands in the building materials industry• Name and brand registered in almost 100 countriesCopyright © 2012 Accenture All rights reserved. 4
  • 5. Accenture• Global management consulting, technology services and outsourcing company• Globally more than 244.000 people• Operating in more than 120 countries• Turnover US$25,5 billion in FY 2011Security Practice• Over 1800 security professionals• Represented in more than 55 countries• Servicing over 250 clientsCopyright © 2012 Accenture All rights reserved. 5
  • 6. Cooperation• VELUX has outsourced IT- application and infrastructure management to Accenture• Accenture delivers advisory services to VELUX• Accenture started working with VELUX to define IAM as part of overall outsourcing dealCopyright © 2012 Accenture All rights reserved. 6
  • 7. It started with…
  • 8. Why I&AM?• Inefficient onboarding processes• Inconsistent identity data• Compliance (Audit findings)• Labor intensive processes = Good foundation for I&AMCopyright © 2012 Accenture All rights reserved. 8
  • 9. Vision
  • 10. Vision1. One common corporate identity for each employee or other associated person • Ensure that all data related to one identity are linked which will heighten the usability and remove sources of error2. Global consistent joiner/mover/leaver process • Save time and resources for the managers and support functions and reduce obstacles and sources of error3. Transparency of valid identity data • Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will improve risk management capabilities4. Agile identity handling and access management • Use automation to reduce time to execute and minimize errors.Copyright © 2012 Accenture All rights reserved. 10
  • 11. Approach
  • 12. Approach1. Define the vision, high-level strategy and roadmap • Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy for implementation that is aligned with business goals across departments2. Choose the right technology partners • Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape3. Implement a proof-of-concept • To goal is to demonstrate capabilities that are relevant for business in specific organizational setting4. Focus on continuous benefit realization with flexible implementation • Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale implementations with distinct benefit realizations modelCopyright © 2012 Accenture All rights reserved. 12
  • 13. Journey
  • 14. Journey1. Capability assessment and workshops with key stakeholders • Goal was to identify the key areas of improvement and pain points • To introduce the concept to key stakeholders and align the business support2. Vendor selection and proof-of-concept • Ensure we chose a vendor and not just a product • Developed a PoC based on multiple scenarios3. Focus on quick wins to get program off the ground • Implemented projects that had quick and visible impact • Proactively focused on areas where IAM is the enabler for implementing better process4. Aligned with overall IT strategy direction • Be flexible in implementation approach • Align with overall direction of IT strategy to ensure ongoing supportCopyright © 2012 Accenture All rights reserved. 14
  • 15. So far, so good
  • 16. Benefit Realization• Implemented enterprise level services• Consistent processes that are easy to adopt• Improved compliance• Greater flexibility to adopt new opportunities The story has just begunCopyright © 2012 Accenture All rights reserved. 16
  • 17. What s in it for you
  • 18. Do’s• Top-level Management support is essential• Broad organizational involvement• Communication at the right level• Risk Management• Legal MattersCopyright © 2012 Accenture All rights reserved. 18
  • 19. Don’ts • Treat I&AM as an IT-project • Aim too high • Promise too much, things take time • Underestimate the “organizational change” aspect • Put I&AM as secondary task, it is a large coordination projectCopyright © 2012 Accenture All rights reserved. 19
  • 20. Thanks for listening!Contact information Contact informationJan Quach Aditya JayanthiAccenture Accenturejan.quach@accenture.com aditya.k.jayanthi@accenture.com
  • 21. Comments or Questions? Come see the Security Systems Team in the Expo area: Jesper Glahn Marcus Eriksson Sven-Erik VestergaardDenmark Sales Leader Sales Leader, ISS Sara Anwar Security Architect & Qradar Nordic Sales