Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Identity and Access Management - IDM365

594 views

Published on

IDM365 is developed for medium and large-scaled businesses, the user-centric interface allows business critical decisions to be made right where the knowledge and information is while keeping IT and Management in control.

The IDM365 Identity and Access Management backend can connect to almost any system or application on the market and provides the flexibility to adapt to each client's business. We have developed tools which allow us to speed up the implementation process, ensuring minimum costs while maintaining maximum accuracy and control.
www.idm365.com

Published in: Software
  • Be the first to comment

Identity and Access Management - IDM365

  1. 1. idm365.com RECLAIM YOUR IDENTITY
  2. 2. idm365.com PRESENTATION CONTENT IDM365 IAM Software and Standards IDM365 You and Our Key Features IDM365 ROI & Implementation IDM365 Concepts, methods and reporting IAM Comparison IAM Standards IAM Software IDM365 Self Service IDM365 Workflow 10 Key IDM365 Features IDM365 Reporting Connection Methods RBAC ABAC and Hybrid IAM Comparison IDM365 Implementation IDM365 ROI IDM365 Help Videos
  3. 3. idm365.com  Identify users  Control user access  Determine user privileges  Delegate administrative authorities IDM365 – IAM SOLUTION Implementing IDM365 Identity Access Management solutions will automate and streamline your companies‘ employees‘ full life cycle
  4. 4. idm365.com IDM365 INFORMATION SECURITY Identity & Access Management solutions can increase your company‘s information security in many ways.  Control and overview over employee‘s accounts and access rights  Security policies can be efficiently implemented through work flows  Information security policies can be centrally managed Breach of data Source: PwC 2014 report “And it’s important to note that insider threats are not necessarily a ‘bad guy with bad intentions; it could be a good employee doing righteous work in an insecure manner. Our problems are more human than technological.” ~ Michael E Mason, Chief Security Officer for Verizon
  5. 5. idm365.com SOME RELEVANT GLOBAL REGULATIONS   Finance Public Sector Pharma & Life Science Energy & Utilities Technology and Manufacturin g Sarbanes-Oxley Act of 2002 (SOX) Important     Important   Basel II Important         ISO 27001 Important Important Important Important   Data Protection and Privacy   Important Important     CoCo   Important Important     PCI   Important Important     NERC       Important   FDA Important Important FCPA Important Important
  6. 6. idm365.com Gartner IAM and IDM365 functionality comparison View on gartner.com
  7. 7. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED Data maintenance and consistent alignment between systems Actions of users Identities Entitlements Activity Identity can be managed by IDM365 Unique identifier and user info IDM365 provides full control of entitlements Rights of use ! ! ! Example: Audit trails on all systems, reports on all identities
  8. 8. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED IAM Functions Key Components Business Value Identity Data Data maintenance and consistent alignment between systems Identities Entitlements Activity Identity can be managed by IDM365 IDM365 provides full control of entitlements ! ! ! Example: Audit trails on all systems, reports on all identities
  9. 9. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON IAM Functions Key Components Business Value Identity Data Gives control to the decision maker Bulk user processing Enables flexible utilization of resources Effectiveness Efficiency Enablement ! ! ! Example: Standardization of workflows, built-in SoD’s
  10. 10. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON IAM Functions Key Components Business Value Identity Data Organization Processes Technology Example: Temporary access handling, Offline system support Customizable, process based workflows and on-off board! Organizational control and overview directly within IDM365 ! Integrates with all systems via standard API!
  11. 11. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON IAM Functions Key Components Business Value Identity Data Access Intelligence Administration Example: Adapts to your business terminology IDM365 provides rule based approval workflows with SoD controls and, automated attribute based permission assignment. ! IDM365 – access; anywhere, at anytime, on any device ! IDM365 gives full user lifecycle management !
  12. 12. idm365.com GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON IAM Functions Key Components Business Value Identity Data ! ! ! ! ! ! ! ! ! ! ! !
  13. 13. idm365.com WHAT DOES IDM365 DO FOR YOU? IDM365 IAM Software and Standards IDM365 You and Our Key Features IDM365 ROI & Implementation IDM365 Concepts, methods and reporting IAM Comparison IAM Standards IAM Software IDM365 Self Service IDM365 Workflow 10 Key IDM365 Features IDM365 Reporting Connection Methods RBAC ABAC and Hybrid IAM Comparison IDM365 Implementation IDM365 ROI IDM365 Help Videos
  14. 14. idm365.com 10 Key IDM365 Features* - by ITMC 1 Intuitive User-centric Interface Simple to use. Time savings. Cost savings. 2 Responsible Self-service IAG software Those who have authority and hands-on info can do the User Management. 3 Segregation of Duties (SoD) SoD is built into the framework. Meets compliance demands. E.g. Purchasing Job Function should not also have Invoicing JF. 4 Fast Implementation and Control IDM365 CLEAN / IDM365 ORGANIZE analyzes the data structure and recommends a new. 5 Compliance Enables businesses to comply with all regulatory demands (SOX, BASEL, ISO 27001, etc.). 6 Turn audits into a time to shine Keeps you compliant and audit ready always. Reports anytime. 7 Help “videos” Video tutorials (30 and growing). Covers most user procedures. Watch one or all. 8 Keep you in control One interface one truth. IDM365 can be acting as your “Single Point of Truth”. 9 Support Decades of experience and focus makes us specialist. Annual updates are included. 10 Cost Simple pricing. No unexpected add-ons. Cost saving implementation tools. Big ROI.
  15. 15. idm365.com SIMPLE BUT SECURE WORKFLOWS Onboarding Job Function: Accounting Assistant ! ! ! ! 1 2 HR creates user and requests access One or more managers approve 5 min Job Function: Financial Management Reporting ? ? 5 -10 min 1 2 Manager requests Additional access for user One or more job function owners approve 3 Job Function: Accounting Assistant Job Function: Financial Management Reporting ! ! This system critical request requires approval from the system owner. IDM365 sends request automatically Modification (add role, function, or attribute) 3 System intelligence recognizes SoD violation. Soft/hard stop 4 System intelligence recognizes SoD violation. Soft/hard stop
  16. 16. idm365.com IDM365 gives you happy employees A typical scenario: IT days later... HR Manager HR and so on... Manager HR Manager Account Sponsor 5 minutes later... approve IDM365Here’s the path an email request might take before your new employee gets access
  17. 17. idm365.com MAKING THE COMPLEX SIMPLE IDM365 IAM Software and Standards IDM365 You and Our Key Features IDM365 ROI & Implementation IDM365 Concepts, methods and reporting IAM Comparison IAM Standards IAM Software IDM365 Self Service IDM365 Workflow 10 Key IDM365 Features IDM365 Reporting Connection Methods RBAC ABAC and Hybrid IAM Comparison IDM365 Implementation IDM365 ROI IDM365 Help Videos
  18. 18. idm365.com RBAC/ABAC HYBRID RBAC RBAC / ABAC Hybrid Jason Philipson Sales Manager UK Role 1 Sales Manager NL Role 2 Jason Philipson Sales ManagerJF Location: NL Location: UK Customized job function for every user Takes time, adds risk. Standardized job functions and attributes The user will receive only the access he needs.
  19. 19. idm365.com IDM365 RBAC / ABAC Hybrid Vs Role Based Access Control required roles: 20 IDM365 Internal multi-function employee Job Function: Purchasing Manager (travels as consultant to overseas branch) Job Function: Sales Team UK office Job Function: Sales Team Location: Germany Germany office A simple organization with only 20 job titles and 20 locations required roles: 400
  20. 20. idm365.com IDM365 CONNECTION METHODS We consume API’s Standard API A majority of API’s exists or can be created (see ITMC API standard document). (incl. in license price) Custom API API specifically developed by ITMC (not incl. in license price) API helps create delete & modify user in system IDM365 starts workflow and sends email to system owner to create user, IDM365 registers creation and logs in audit trail. System owner Offline System System is offline, or is treated as an offline system.
  21. 21. idm365.com  Choose between 11 built-in reports  Add other available standard reports from the Standard report document  Add client custom reports on demand IDM365 AUDIT Example: Deviation Report Shows deviation between IDM365, and system as well as reason. IDM365 real-time reporting
  22. 22. idm365.com BEST PRACTISE IMPLEMENTATION Rapid implementation – 30 days implementation process 2 IDM365:Clean tool - PDF/Excel 3 IDM365:Organize tool -PDF/Excel 4 IDM365:Audit system setup 1 Determine business and system scope. CIO Sales Manager Manager Finance Manager
  23. 23. idm365.com BEST PRACTISE IMPLEMENTATION Rapid implementation – 30 days implementation process 2 IDM365:Clean tool - PDF/Excel 3 IDM365:Organize tool -PDF/Excel 4 IDM365:Audit system setup 1 Determine business and system scope.
  24. 24. idm365.com BEST PRACTISE IMPLEMENTATION Rapid implementation – 30 days implementation process 2 IDM365:Clean tool - PDF/Excel 3 IDM365:Organize tool -PDF/Excel 4 IDM365:Audit system setup 1 Determine business and system scope.
  25. 25. idm365.com BEST PRACTISE IMPLEMENTATION Rapid implementation – 30 days implementation process 2 IDM365:Clean tool - PDF/Excel 3 IDM365:Organize tool -PDF/Excel 4 IDM365:Audit system setup 1 Determine business and system scope. CIO Sales Manager Manager Finance Manager
  26. 26. idm365.com You can cut your dependency on us from day to day — just “unplug” it.  No dependency  No long extraction period  Your in control But we bet you won’t, because our software does exactly what you want it to. WE TRUST THAT WE HAVE THE BEST IAM SOFTWARE We think that you will love our product so much, that…
  27. 27. idm365.com COST SAVINGS AND BENEFITS IDM365 IAM Software and Standards IDM365 You and Our Key Features IDM365 ROI & Implementation IDM365 Concepts, methods and reporting IAM Comparison IAM Standards IAM Software IDM365 Self Service IDM365 Workflow 10 Key IDM365 Features IDM365 Reporting Connection Methods RBAC ABAC and Hybrid IDM365 benefits and support IDM365 Implementation IDM365 ROI IDM365 Help Videos
  28. 28. idm365.com CONTROL THE PROCESS 1.  Workshop involving IT management and relevant business management. Max 2 hours 2.  Workshop involving relevant IT management and relevant system management. Max 2 hours 3.  Prepared by IDM365 project manager and consolidated with Client project manager 4.  The IDM:Clean analysis tool is then utilized to generate reports for each individual system involved. Output can be imported directly in system 5.  Identifying the job functions performed under each department or team, and the permissions they require; suitable representatives for each department will therefore be identified 6.  System is setup by the IDM365 experts 7.  Testing system before roll-out is essential, in order to make sure that testing takes all scenarios into consideration. Performed by client 8.  Beta Roll-out is used to ensure a successful Final Roll-out 9.  Final Roll-out – Training - certification 1.#Determine#Business#Scope# 2.#Determine#System#Scope# 3.#Determine#Implementa8on#Plan# 4.#Complete#IDM:Clean*## 5.#Complete#IDM:Organize*# 6.#Complete#IDM365#System#Setup# 7.#Complete#Tes8ng# 8.#Beta#RollHout# 9.#Final#RollHout# *Auto generated
  29. 29. idm365.com IDM365 BENEFITS 1 2 3 4 Minimize time spent on on- boarding by up to 90% Move workload from IT to business Built in audit trail for all users on all systems Gain business overview 5 6 7 8 Extensive reporting tool Achieve good governance and minimize risk Speed up implementation time on new systems License alignment 9 10 11 12 30 day implementation process Highten security Save money Gain flexibility with RBAC/ABAC hybrid
  30. 30. idm365.com  Training during implementation phases  Training of Super Users + certification  Video training on roll out  Complete Service Catalogue with options for every need  Rich follow up after implementation ENSURE SUCCESS How we support success 70% of all IT system introductions fail because of lacking “ease of use” We make sure you are guided in every step of the way
  31. 31. idm365.com Choose the service that fits you, from our vast Service Catalogue:  Get a Custom Service package that fits you. (E.g. Workflows, Job function setup …)  Choose service by the hour IDM365 SERVICE Let us help you – we do it every day Due to unique insight and specialist knowledge, we can ensure that you are compliant with your compliance demands on user management. Do what you like to do, let us do the rest

×