HCLT Brochure: Identity & Access Management Services

853 views
676 views

Published on

http://hclte.ch/If33g9 - IT Management Tools

http://www.hcltech.com/ - More on HCL Technologies

Terrorist sabotage. Identity theft. Credit card fraud. Corporate malfeasance. Privacy violations. Many critical problems facing society today involve unauthorized access to, and use of personal and other confidential data. Managing users' identities and entitlements has become increasingly complex as enterprises allow employees, contractors, partners, suppliers and customers access to their systems and information. Most of the organiations are looking at IAM to be more "Business Agile", increase their "Operational and Business efficiency" and to stay "Compliant". It is imperative that enterprises initiate, develop and define ongoing IAM programs. HCL’s significant understanding of both business as well as technology makes it an ideal partner to help create business-relevant road maps and solutions to address an enterprises’ identity and access management needs. Our IAM practice has developed methodologies for helping enterprises comply with rigorous compliance deadlines without compromising efforts implementing their strategic road map.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
853
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

HCLT Brochure: Identity & Access Management Services

  1. 1. Identity and Access Management ServicesTerrorist Sabotage Identity TheftCredit Card Fraud Corporate Malfeasance Identity Theft HCL Information Security Practice
  2. 2. Why to go for IAM Services ?Terrorist sabotage. Identity theft. Credit card fraud. Corporate malfeasance. Privacy violations. Many critical problemsfacing society today involve unauthorized access to, and use of personal and other confidential data. Managing usersidentities and entitlements has become increasingly complex as enterprises allow employees, contractors, partners,suppliers and customers access to their systems and information. At the same time, enterprises have been under increasingpressure to ensure that they manage users identity and access in compliance with new legislation and regulation — and beable to demonstrate that they do so. Moreover, the demands of regulatory compliance are driving corporate IT and securitymanagers to improve their process for governing user access. What is keeping them awake most of all, however, is not justregulatory compliance but the entire array of serious problems that can result from their inability to see who has access towhich information resources, to manage access change as user job responsibilities change, to maintain audit trails, and toensure that all users have access that is appropriate for their job function.From our experience and various customer engagements we can state that most of the customers are looking at IAM to bemore "Business Agile", increase their "Operational and Business efficiency" and to stay "Compliant". It is imperative thatenterprises initiate, develop and define ongoing IAM programs. They must then continuously improve and then maintainthe maturity of these programs over time. Defining a streamlined, automated and standardized enterprise-wide identitymanagement program comes with its set of challenges such as Timely Protecting Balancing Design of effective implementation of Adopting a sensitive data and investments in control mechanism Identity business maximizing the these systems supported by Management oriented efficiency of while improving sufficient reporting solutions to adhere approach critical business operational and documentation to compliance processes efficiency requirementsTackling these challenges requires clear understanding of the business as well as the complex IT environment characteristicof global enterprises. The first key to success is recognizing that identity management is a process and not technology or asoftware product. HCL’s significant understanding of both business as well as technology makes it an ideal partner to helpcreate business-relevant road maps and solutions to address an enterprises’ identity and access management needs. OurIAM practice has developed methodologies for helping enterprises comply with rigorous compliance deadlines withoutcompromising efforts implementing their strategic road map.
  3. 3. HCL Identity and Access Management Services Identity Access Privileged Identity Management Management Identity Governance Authentication Services Services Services Services ServicesIntegration/Development Identity Web Privileged Role Multi FactorServices Life Cycle Access Remote Engineering Authentication Management Management Access and ModelingDirectoryServices Enterprise Adaptive Asset Single Privileged Authentication Provisioning Sign On SessionCompliance, Management SoDAuditing & ComplianceReporting Web Single Out Of Centralized Sign On Band Role Privileged AuthenticationMigration Management SingleServices and Federation Sign On Identity Attestations Services Assurance AuthenticationManaged BrokerageServices Role Based Auditing and Access Control Work Flow Reporting of Privileged Entitlement Design and andArchitecture/ Sessions Managed Implementation OS Access AccessAdvisory AuthenticationServices Control Certification ServicesHCL’s IAM Practice covers Risk based Compliance Implementation, User Provisioning and Identity Administration,Authentication Services, Password Management, Web and Enterprise Sign-on, Directory Services and Access Management,Federated Identity Management, Strong Authentication and Risk Based Authentication, Segregation of Duties, Role BasedAccess and Role Engineering, and Web Services Security.
  4. 4. Our ApproachSenior management and key stakeholders have a clear cut need to understand the long-term strategy for identity and accessmanagement. IAM solutions can help transform the enterprise to a quickly changing enterprise if implemented properly.Hence it is important to understand that to reduce failures in an IAM program, strategy and planned implementation plays amajor role. HCL’s IAM Practice has defined a well thought out delivery cycle for an IAM program as shown below: Architecture Foundation Build Production Life cycle Consulting and design and testing Rollout support IAM Consulting Services Project Management and Quality User Life Authentication IAM Cycle Management Services Audit and Solution Compliance CoE’s Access & Entitlements Privileged User Reporting Management ManagementIt’s clear that IAM projects require considerable planning and project management expertise, with a project teamrepresenting various stakeholders within the company. Most notably, like virtually any large IT project, IAM requires strongsponsorship from senior company management, who must understand the business benefits the technology can bring. Andeveryone involved needs to understand that, to live up to their full potential, IAM solutions require regular care and feedinglong after the initial go-live date, which means planning for follow-up optimizations is crucial as well. HCL’s experiencedconsultants use the structured approach to help the organization assess, design, implement, manage and monitor aneffective identity and access management program and drive key customer benefits like the following: HCL IAM Key IAM Customer Services Deliverables Benefits Ÿ IAM Roadmap Ÿ Process Automation Ÿ Improved end-user consulting Services and optimization experience Ÿ IAM Implementation Ÿ Access Governance Ÿ Scalability and Services Ÿ Audit and Compliance Integration Ÿ Integration and reporting Ÿ Improved Operational development services Ÿ Role Based Access efficiency Ÿ Identity Migration Management Ÿ Reduced services Ÿ Single Sign On and Administrative Costs Ÿ Managed Identity Federation Services Ÿ Privileged Identity Services
  5. 5. HCL Credentials and Key Differentiators Ÿ More than 25 customers worldwide have gained from HCL’s IAM expertise in variousHCL IAM stages of their IAM new and transformational projects Ÿ Availability of more than 700+ pool of expertise having diversified understanding ofServices Security domain including consulting, implementation, development and operationsHCL IAM Ÿ Highly scalable labs for products, PoC’s , trainings and innovations Ÿ Innovation-focused to support highly scalable solutionsCoE Ÿ Global partnership with key product vendors for offering joint solutionsLarge pool Ÿ Architects and security consultants with multiple project experienceof IDAM Ÿ Large development pool to address IDAM customizations and integrationsexpertsFunctional Ÿ Increased Customer Satisfaction by 43% - CSAT Survey 2009Delivery Ÿ Quadrupled the Number of Customers Ÿ $5mn+ & $10mn+ Customers Grew by 4xExcellence Ÿ $20mn+ Customers Grew by 5xModelCase in Discussion: Asia’s largest Stock Exchange

×