Identity & Access Management                                                  Jan Quach & Aditya Jayanthi                 ...
Agenda•     We are…•     It all started…•     Vision•     Approach•     Journey•     So far, so good•     What’s in it for...
We are VELUX and Accenture
The VELUX Group•     Established in 1941•     Approx. 10000 employees globally•     2600 in Denmark•     Sales companies i...
Accenture•     Global management consulting,      technology services and outsourcing      company•     Globally more than...
Cooperation•     VELUX has outsourced IT-      application and infrastructure      management to Accenture•     Accenture ...
It started with…
Why I&AM?•     Inefficient onboarding processes•     Inconsistent identity data•     Compliance (Audit findings)•     Labo...
Vision
Vision1.      One common corporate identity for each employee or other        associated person        •        Ensure tha...
Approach
Approach1.      Define the vision, high-level strategy and roadmap        •        Ensure that all business stakeholders a...
Journey
Journey1.      Capability assessment and workshops with key stakeholders        •        Goal was to identify the key area...
So far, so good
Benefit Realization•      Implemented enterprise level services•      Consistent processes that are easy to adopt•      Im...
What s in it for you
Do’s•     Top-level Management support is essential•     Broad organizational involvement•     Communication at the right ...
Don’ts •      Treat I&AM as an IT-project •      Aim too high •      Promise too much, things take time •      Underestima...
Thanks for listening!Contact information       Contact informationJan Quach                 Aditya JayanthiAccenture      ...
Comments or Questions?  Come see the Security Systems Team          in the Expo area:    Jesper Glahn       Marcus Eriksso...
Upcoming SlideShare
Loading in...5
×

Værdien af Identity & Access Management, Jan Quach, Accenture

733

Published on

Præsentation fra Smarter Business 2012

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
733
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Værdien af Identity & Access Management, Jan Quach, Accenture

  1. 1. Identity & Access Management Jan Quach & Aditya Jayanthi Information Security ServicesCopyright © 2012 Accenture All rights reserved. 1
  2. 2. Agenda• We are…• It all started…• Vision• Approach• Journey• So far, so good• What’s in it for youCopyright © 2012 Accenture All rights reserved. 2
  3. 3. We are VELUX and Accenture
  4. 4. The VELUX Group• Established in 1941• Approx. 10000 employees globally• 2600 in Denmark• Sales companies in almost 40 countries• Production companies in 11 countries• Head office in Hørsholm, Denmark• Owned by VKR Holding, a limited company wholly owned by foundations and family• VKR Holding turnover 17,8 billion. DKK in 2010.• One of the strongest global brands in the building materials industry• Name and brand registered in almost 100 countriesCopyright © 2012 Accenture All rights reserved. 4
  5. 5. Accenture• Global management consulting, technology services and outsourcing company• Globally more than 244.000 people• Operating in more than 120 countries• Turnover US$25,5 billion in FY 2011Security Practice• Over 1800 security professionals• Represented in more than 55 countries• Servicing over 250 clientsCopyright © 2012 Accenture All rights reserved. 5
  6. 6. Cooperation• VELUX has outsourced IT- application and infrastructure management to Accenture• Accenture delivers advisory services to VELUX• Accenture started working with VELUX to define IAM as part of overall outsourcing dealCopyright © 2012 Accenture All rights reserved. 6
  7. 7. It started with…
  8. 8. Why I&AM?• Inefficient onboarding processes• Inconsistent identity data• Compliance (Audit findings)• Labor intensive processes = Good foundation for I&AMCopyright © 2012 Accenture All rights reserved. 8
  9. 9. Vision
  10. 10. Vision1. One common corporate identity for each employee or other associated person • Ensure that all data related to one identity are linked which will heighten the usability and remove sources of error2. Global consistent joiner/mover/leaver process • Save time and resources for the managers and support functions and reduce obstacles and sources of error3. Transparency of valid identity data • Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will improve risk management capabilities4. Agile identity handling and access management • Use automation to reduce time to execute and minimize errors.Copyright © 2012 Accenture All rights reserved. 10
  11. 11. Approach
  12. 12. Approach1. Define the vision, high-level strategy and roadmap • Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy for implementation that is aligned with business goals across departments2. Choose the right technology partners • Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape3. Implement a proof-of-concept • To goal is to demonstrate capabilities that are relevant for business in specific organizational setting4. Focus on continuous benefit realization with flexible implementation • Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale implementations with distinct benefit realizations modelCopyright © 2012 Accenture All rights reserved. 12
  13. 13. Journey
  14. 14. Journey1. Capability assessment and workshops with key stakeholders • Goal was to identify the key areas of improvement and pain points • To introduce the concept to key stakeholders and align the business support2. Vendor selection and proof-of-concept • Ensure we chose a vendor and not just a product • Developed a PoC based on multiple scenarios3. Focus on quick wins to get program off the ground • Implemented projects that had quick and visible impact • Proactively focused on areas where IAM is the enabler for implementing better process4. Aligned with overall IT strategy direction • Be flexible in implementation approach • Align with overall direction of IT strategy to ensure ongoing supportCopyright © 2012 Accenture All rights reserved. 14
  15. 15. So far, so good
  16. 16. Benefit Realization• Implemented enterprise level services• Consistent processes that are easy to adopt• Improved compliance• Greater flexibility to adopt new opportunities The story has just begunCopyright © 2012 Accenture All rights reserved. 16
  17. 17. What s in it for you
  18. 18. Do’s• Top-level Management support is essential• Broad organizational involvement• Communication at the right level• Risk Management• Legal MattersCopyright © 2012 Accenture All rights reserved. 18
  19. 19. Don’ts • Treat I&AM as an IT-project • Aim too high • Promise too much, things take time • Underestimate the “organizational change” aspect • Put I&AM as secondary task, it is a large coordination projectCopyright © 2012 Accenture All rights reserved. 19
  20. 20. Thanks for listening!Contact information Contact informationJan Quach Aditya JayanthiAccenture Accenturejan.quach@accenture.com aditya.k.jayanthi@accenture.com
  21. 21. Comments or Questions? Come see the Security Systems Team in the Expo area: Jesper Glahn Marcus Eriksson Sven-Erik VestergaardDenmark Sales Leader Sales Leader, ISS Sara Anwar Security Architect & Qradar Nordic Sales
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×