SlideShare a Scribd company logo
1 of 11
Inventy
What does it mean to
OPTIMIZE the user
lifecycle?
INVENTY
April 2015 – SAP Security 360° Service
Have you ever had serious
difficulties in obtaining
computer rights ?
I HAVE !
Application
Form
Search for
permissions
and accounts
Add to the
request
Validate
request
Provisioning
and details
Monitoring
request and
notifications
Operational
accounts and
permissions
EASY! A simple 7 step process…
Requesting IT access rights for a normal user ?
But reality is oftendifferent …
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Optimization
Zone
S
S
S
S
C
C
S
S
S
S
S
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action
.
Complex action natively integrated
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
…integrated data flows accelerate AUDITS
and reduce maintenance costs
Integrated data flow
.
I
I
I
I
I
I
I
I
I
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
I
I
I
Add to the
request
Provisioning and
details
Operational
accounts and
permissions
By profiles and
by users
Return code from
target applications
Initial password
change
Connection
validation
Person in
charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application
form
Search for
permissions
and accounts
Validate
request
Monitoring
request and
notifications
Adding partial
roles
Requests
by user
copy
Automatic
additions by HR
Profile
Manager
validation Provisioning
Security Validation /
Authorization catalog
exposure
Compliance
validation
User email
April 2015
Inventy
François Michel – francois.michel@inventy.ca - 514-804-2333
Odette Scully – odette.scully@inventy.ca – 514-972-7245
www.inventy.com
Contact us to learn more
We would love to hear
more from you!

More Related Content

What's hot

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management softwareRITESH HELONDE
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)Sajjad Khan
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforceiDocuments
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoRyan Golez
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Companyguestf8ad8d
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution RITESH HELONDE
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementGaryRichards30
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionMatrix ComSec
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam Pandita
 

What's hot (18)

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management software
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
AppRoamer_Presentation
AppRoamer_PresentationAppRoamer_Presentation
AppRoamer_Presentation
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
 
IdM FinalVer
IdM FinalVerIdM FinalVer
IdM FinalVer
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforce
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demo
 
Finance
FinanceFinance
Finance
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Company
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
 
Lloyd Pro Group
Lloyd Pro GroupLloyd Pro Group
Lloyd Pro Group
 
Multitasking- Friend or Foe
Multitasking- Friend or FoeMultitasking- Friend or Foe
Multitasking- Friend or Foe
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance Solution
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)
 

Similar to What does it mean to optimize the user lifecycle ?

CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldForte Advisory, Inc.
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications LBi Software
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPSmart ERP Solutions, Inc.
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!Net at Work
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentationmssigm
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)WizeHive
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2mssigm
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldEkhlaque Bari
 
Step up authentication
Step up authenticationStep up authentication
Step up authenticationJack Forbes
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise pptbaryonsadmin
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMeetsolanki39
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online PresentationGenpact LLC
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSalesforce Admins
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2Salesforce Developers
 

Similar to What does it mean to optimize the user lifecycle ? (20)

Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentation
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital world
 
App roamer presentation
App roamer presentationApp roamer presentation
App roamer presentation
 
Step up authentication
Step up authenticationStep up authentication
Step up authentication
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise ppt
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online Presentation
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

What does it mean to optimize the user lifecycle ?

  • 1. Inventy What does it mean to OPTIMIZE the user lifecycle? INVENTY April 2015 – SAP Security 360° Service
  • 2. Have you ever had serious difficulties in obtaining computer rights ?
  • 4. Application Form Search for permissions and accounts Add to the request Validate request Provisioning and details Monitoring request and notifications Operational accounts and permissions EASY! A simple 7 step process… Requesting IT access rights for a normal user ?
  • 5. But reality is oftendifferent … Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions
  • 6. Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Each step requires coordination of unclear sub processes involving multiple actors ...
  • 7. At Inventy, we OPTIMIZE and SECURE the user lifecycle Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Optimization Zone
  • 8. S S S S C C S S S S S C C S with SAP Identity & Access Governance, each step is modeled and automated in IDM & GRC … S C Simple automated action . Complex action natively integrated Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation
  • 9. …integrated data flows accelerate AUDITS and reduce maintenance costs Integrated data flow . I I I I I I I I I Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation I I I
  • 10. Add to the request Provisioning and details Operational accounts and permissions By profiles and by users Return code from target applications Initial password change Connection validation Person in charge validation Our commitment ? A simple user experience A COMPLIANT process with a low cost Application form Search for permissions and accounts Validate request Monitoring request and notifications Adding partial roles Requests by user copy Automatic additions by HR Profile Manager validation Provisioning Security Validation / Authorization catalog exposure Compliance validation User email
  • 11. April 2015 Inventy François Michel – francois.michel@inventy.ca - 514-804-2333 Odette Scully – odette.scully@inventy.ca – 514-972-7245 www.inventy.com Contact us to learn more We would love to hear more from you!