SlideShare a Scribd company logo
1 of 2
Download to read offline
Building Confidence in the Cloud with
DemandTec
DemandTec helps retailers and consumer product companies
optimize merchandising and marketing decisions, individu-
ally or collaboratively, to achieve their sales volume, revenue,
shopper loyalty, and profitability objectives.
DemandTec’s vision is for retailers and consumer product manufacturers
to work together collaboratively and efficiently, blending art with science
to understand consumer behavior and ultimately executing win-win plans
that achieve their respective financial objectives and long-term loyalty to
the brand or retail banner.
CHALLENGES
SECURITY CONCERNS CAUSED BY MIGRA-
TION TO CLOUD-BASED APPLICATIONS
As DemandTec realized the benefits of SaaS applica-
tion use, they were also aware of the associated secu-
rity and identity concerns. They knew that disparate
applications running in datacenters that they had no
control over made them more susceptible to lost or
stolen passwords, unauthorized access, and an inef-
ficient end user experience.
ADMINISTRATIVE CONCERNS WITH
EXPANDING SAAS USE
Some applications supported the open standard SAML,
while most did not. DemandTec needed an identity
partner who could integrate with any application.
INEFFICIENT AND UNPREDICTABLE
END-USER EXPERIENCE WHEN USING MUL-
TIPLE APPLICATIONS
DemandTec’s end users had to manage multiple
usernames and passwords for their applications, mak-
ing them less productive and increasingly frustrated.
It also led to poor password choices and storage
practices.
case
study
continued
“Symplified’s technology
has not only provided log
in transparency to the nu-
merous SaaS applications
used by our company,
Symplified has increased
our confidence in using
applications in the cloud.”
— Darren Nguy
IT Manager
DemandTec
SOLUTION
SYMPLIFIED PROVIDED SINGLE SIGN-ON TO
MULTIPLE APPLICATIONS THROUGH SAML
AND HTTP-FEDERATION CONNECTORS
Darren Nguy, IT Manager at DemandTec selected
Symplified as the only solution in the market that
accomplished what he needed. “We have a lot of SaaS
applications in use, some that support the SAML SSO
protocol and a lot that do not,” said Nguy. “We needed
a solution that could provide authentication, access
control, audit functions, and single sign-on for all of
our applications.”
BENEFITS
DemandTec’s employees and customers have enthusiastically supported the changes Symplified has enabled.
Benefits include:
» Improved security for corporate employees by pro-
viding access to all SaaS applications
According to Gartner, less than 25% of SaaS applica-
tions support SAML for access control and SSO. Sym-
plified provided the only proprietary HTTP Federation
technology to provide the security needed for non-
SAML SaaS applications.
» Time saving by managing SaaS access within existing
Active Directory infrastructure
With Symplified, authentication and access control
were achieved from a single user store. In De-
mandTec’s case, this was to use their existing Active
Directory. When a user signed on, Symplified pulled
attribute and group membership information from
Active Directory. This information was used to run
access policies that were administered by the Access
Manager to determine to which applications the
user had access. The employee was only granted
access to those applications. “Controlling all access
from our existing user store in Active Directory has
enabled us to add the control we need over cloud
applications with very little additional IT administra-
tive tasks,” stated Nguy.
» Improved user security for corporate employees
experience through single sign-on
Through Symplified, employees gained the ad-
vantage of single sign-on to multiple applications,
reducing the chance of compromised or forgotten
passwords and frequent calls to the help desk for
password resets. For employees on the corporate
Windows domain, Symplified’s solution utilized IWA
to leverage the network login, via Kerberos, allowing
users to access the multiple protected applications
without any additional sign-on steps required.
1600 Pearl Street, Suite 200 » Boulder, CO, 80302 » www.symplified.com » @Symplified
THE SYMPLIFIED ADVANTAGE
Symplified enables IT organizations to simplify user access to applications, regain visibility and control over usage and meet security and
compliance requirements. Symplified provides single-sign-on, identity and access management, directory integration, centralized provisioning,
strong authentication, mobile device support and flexible deployment options. Symplified is headquartered in Boulder, Colorado.
Visit us at www.symplified.com.
continued

More Related Content

What's hot

Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS America
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Enterprise Mobility: Getting Trendy
Enterprise Mobility: Getting TrendyEnterprise Mobility: Getting Trendy
Enterprise Mobility: Getting TrendyMarkiyan Matsekh
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 

What's hot (20)

Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Ilantus brochure
Ilantus brochureIlantus brochure
Ilantus brochure
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Enterprise Mobility: Getting Trendy
Enterprise Mobility: Getting TrendyEnterprise Mobility: Getting Trendy
Enterprise Mobility: Getting Trendy
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 

Similar to DemandTec case study

Merit Medical case study
Merit Medical case study Merit Medical case study
Merit Medical case study Symplified
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaSJane Jones
 
AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)Emma Kelly
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsHappiest Minds Technologies
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3Pieter Noorlander
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Introduction to Integration Technologies
Introduction to Integration TechnologiesIntroduction to Integration Technologies
Introduction to Integration TechnologiesBizTalk360
 

Similar to DemandTec case study (20)

Merit Medical case study
Merit Medical case study Merit Medical case study
Merit Medical case study
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
3i Infotech Case Study
3i Infotech Case Study3i Infotech Case Study
3i Infotech Case Study
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaS
 
AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)AccessPaaS (SafePaaS)
AccessPaaS (SafePaaS)
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Introduction to Integration Technologies
Introduction to Integration TechnologiesIntroduction to Integration Technologies
Introduction to Integration Technologies
 

DemandTec case study

  • 1. Building Confidence in the Cloud with DemandTec DemandTec helps retailers and consumer product companies optimize merchandising and marketing decisions, individu- ally or collaboratively, to achieve their sales volume, revenue, shopper loyalty, and profitability objectives. DemandTec’s vision is for retailers and consumer product manufacturers to work together collaboratively and efficiently, blending art with science to understand consumer behavior and ultimately executing win-win plans that achieve their respective financial objectives and long-term loyalty to the brand or retail banner. CHALLENGES SECURITY CONCERNS CAUSED BY MIGRA- TION TO CLOUD-BASED APPLICATIONS As DemandTec realized the benefits of SaaS applica- tion use, they were also aware of the associated secu- rity and identity concerns. They knew that disparate applications running in datacenters that they had no control over made them more susceptible to lost or stolen passwords, unauthorized access, and an inef- ficient end user experience. ADMINISTRATIVE CONCERNS WITH EXPANDING SAAS USE Some applications supported the open standard SAML, while most did not. DemandTec needed an identity partner who could integrate with any application. INEFFICIENT AND UNPREDICTABLE END-USER EXPERIENCE WHEN USING MUL- TIPLE APPLICATIONS DemandTec’s end users had to manage multiple usernames and passwords for their applications, mak- ing them less productive and increasingly frustrated. It also led to poor password choices and storage practices. case study continued “Symplified’s technology has not only provided log in transparency to the nu- merous SaaS applications used by our company, Symplified has increased our confidence in using applications in the cloud.” — Darren Nguy IT Manager DemandTec
  • 2. SOLUTION SYMPLIFIED PROVIDED SINGLE SIGN-ON TO MULTIPLE APPLICATIONS THROUGH SAML AND HTTP-FEDERATION CONNECTORS Darren Nguy, IT Manager at DemandTec selected Symplified as the only solution in the market that accomplished what he needed. “We have a lot of SaaS applications in use, some that support the SAML SSO protocol and a lot that do not,” said Nguy. “We needed a solution that could provide authentication, access control, audit functions, and single sign-on for all of our applications.” BENEFITS DemandTec’s employees and customers have enthusiastically supported the changes Symplified has enabled. Benefits include: » Improved security for corporate employees by pro- viding access to all SaaS applications According to Gartner, less than 25% of SaaS applica- tions support SAML for access control and SSO. Sym- plified provided the only proprietary HTTP Federation technology to provide the security needed for non- SAML SaaS applications. » Time saving by managing SaaS access within existing Active Directory infrastructure With Symplified, authentication and access control were achieved from a single user store. In De- mandTec’s case, this was to use their existing Active Directory. When a user signed on, Symplified pulled attribute and group membership information from Active Directory. This information was used to run access policies that were administered by the Access Manager to determine to which applications the user had access. The employee was only granted access to those applications. “Controlling all access from our existing user store in Active Directory has enabled us to add the control we need over cloud applications with very little additional IT administra- tive tasks,” stated Nguy. » Improved user security for corporate employees experience through single sign-on Through Symplified, employees gained the ad- vantage of single sign-on to multiple applications, reducing the chance of compromised or forgotten passwords and frequent calls to the help desk for password resets. For employees on the corporate Windows domain, Symplified’s solution utilized IWA to leverage the network login, via Kerberos, allowing users to access the multiple protected applications without any additional sign-on steps required. 1600 Pearl Street, Suite 200 » Boulder, CO, 80302 » www.symplified.com » @Symplified THE SYMPLIFIED ADVANTAGE Symplified enables IT organizations to simplify user access to applications, regain visibility and control over usage and meet security and compliance requirements. Symplified provides single-sign-on, identity and access management, directory integration, centralized provisioning, strong authentication, mobile device support and flexible deployment options. Symplified is headquartered in Boulder, Colorado. Visit us at www.symplified.com. continued