Ums 2009 Slide Share Ks
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Ums 2009 Slide Share Ks

on

  • 702 views

Why and how Identity is ultimately managed.

Why and how Identity is ultimately managed.

Statistics

Views

Total Views
702
Views on SlideShare
700
Embed Views
2

Actions

Likes
0
Downloads
4
Comments
0

1 Embed 2

http://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Ums 2009 Slide Share Ks Presentation Transcript

  • 1.
  • 2. Presentation of itmc ltd.
    • Business Consultants
    • 3. Security Analysts
    Background
    • Compliance
    • 4. Security
    • 5. Risk Assessment
    • 6. Business Contingency Planning
  • Presentation of itmc ltd.
    ITOM
    User Management
    Asset Management
    Help Desk / Service Center, ITIL-3 based.
    Strategic IT Consulting
    IT Outsourcing
  • 7. Presentation of itmc ltd.
    ITOM
    Strategic IT Consulting
    IT Strategy
    Business Continuity
    Risk Analysis
    IT Security
    Compliance
    Project development
    Landscaping and Documentation
    IT Outsourcing
  • 8. Presentation of itmc ltd.
    ITOM
    Strategic IT Consulting
    IT Outsourcing
    Project Development
    Project Management
    Everything Sharepoint, SQL, .NET
    Systems development and maintenance
    Application development and maintenance
    Offshoring
  • 9. IT Operation Management
    By job function the user gets an IT-uniform.
    The job function and employee type defines the IT-privileges
    The job function initiate the hand out of asset packages and tools.
    By knowing job function, privileges, systems and assets the SC is fully capable of handling all needs and urgent actions, for all parts of the organization.
    Hole operation goes from handling individuals to handling roles and packages.
  • 10. Operation Management
  • 11. Summary
    Identity Management - based on strong Role Based Access Control (RBAC)
    • Provides documentation that can be used for compliance monitoring in accordance with laws or regulatory frameworks
    • 12. Ensures that users are only provided with approved permissions
    • 13. Ensures that new users never inherit privileges from previous users based on ‘because that is what they had’
    • 14. Ensures that all access is automatically removed when users leave their role
  • Summary
    Automation - based on management approval workflows
    • Automation of approval workflows reduce ‘paper chasing’ and the associated administration and time costs
    • 15. Approval workflows strengthen security and enforce separation of duties
    • 16. Automation centralizes user and access management
    • 17. Approval workflows also ensure approval accountability and audit tracking
  • Introduction and Objectives
    • BUSINESS CONTROLUMS enables the company to maintain user access rights from an easy-to-use and easy-to-understand interface, based on users’ job functions (roles).
    • 18. SECURITY UMS provides a secure structure that enables the organization to maintain a strict policy of providing only need-to-know based access, supported by comprehensive documentation.
    • 19. COMPLIANCE UMS enables the business to meet regulatory demands of BASEL II, CoBit, SOX (Sarbanes-Oxley), Euro-SOX and other related frameworks. UMS will enable the organization to secure World-Class compliance in relation to user and access management.
    • 20. FREE UP RESOURCESUMS will transfer the burden of user management from highly skilled IT professionals to administrative personnel, supported by management approval workflows.
  • Technology
    • UMS is based on Microsoft Share Point 2007 and thereby benefits from inherent association with various other parts of the Microsoft software family.
    • 21. UMS communicates seamlessly with Active Directory, MS SQL Server and Oracle databases, SAP, OLE DB, Unix, LDAP based systems and ERP’s in general. UMS control almost every user-access controlled information system.
  • Key points of UMS
    Ease of use
    • Easy to create a new user in only 5 steps.
    • 22. Very flexible handling of all types of employees and systems
    • 23. Able to deal with external employees and distribution groups.
    Simple to manage
    • UMS automatically rolls down changes to job functions to all associated users
    • 24. UMS also contains many features such as automatically removing permissions at the end date of their job functions.
  • More information
    Please visit our website for more information at www.umsolution.net