SlideShare a Scribd company logo
1 of 11
IdentityVigil Overview
November 14, 2014
2 © Happiest Minds – Confidential
MonitorandManage(24X7)
UserAccessManagement
Services
Identity & Access Management Services
Value Adds => Integration Artifacts (Architecture, design, code ) across multiple products, service delivery framework, process
templates, productivity templates, operation process, delivery templates etc.
Deploy,Integrate,
Customize,virtualize
Strategy Roadmap Define Implement Operate Integrate
Access Management Platform
•SSO & ESSO
•Federated SSO
•Strong, Risk Based
Authentication
•Password Management
•Social Logins
•Entitle management
Identity Solution
Platform
•User Management
•Privilege Password
Management
•Access Governance
•Role Management
•Identity Intelligence
•Segregation of Duties
Directory Services
Platform
•Intranet and Extranet Directory
Services
•Virtual Directory
3 © Happiest Minds – Confidential© Happiest Minds – Confidential
Happiest Minds Credentials in IAG Area
Security Practice focused on innovative and disruptive
technologies with 170+ members
Dedicated IAM Practice with 100+ person years of
experience in IAM
Innovation and technology led Consulting practice
leverages cutting edge tools to optimize time & cost
Innovative Delivery Model (Productized Solution Center
Model)
Continuous Improvement in IAM operations &
Application On- Boarding through non-linear execution
model
CoE contribution for reusable components, templates,
artifacts & design patterns for IAM
Strong alliance with product vendors to develop best in
class solutions
Team of 50+ IAM Consultants & Specialist in IAM
Experienced team with efficient pre-planning by
leveraging the past experience and advanced knowledge
base
Experienced team that has executed over 20+ large IAM
projects across Fortune 500 companies in the past
Pre-built use cases for Enterprise wide IAM
Productized solutions to expedite IAM rollout process
Vast
experience
in execution
Innovation
led
approach
Strong team
of IAM
Consultants
Focused
IAM Practice
Line
4 © Happiest Minds – Confidential
IDENTITYVIGIL – IDENTITY AS A SERVICE
OFFERING
5 © Happiest Minds – Confidential
Identity and Access Governance - Enterprise Challenges
 Reliance on manual processes
– 58% of companies use mostly manual methods to monitor identity and access management
– Costly and inefficient
– Inconsistent and unpredictable outcomes
 Exposure to Compliance and Operational risks
– Gaps/delays in removing orphan accounts
– Privileged account proliferation
– Entitlement creep
 Inability to Enforce Preventive Controls
– Inconsistent and ad hoc change processes
– Dependency on “after the fact” detective controls
– Reactive approach to handle compliance issues
 Gaps Between Business and IT Groups
– 87% of the companies employ a decentralized approach to identity and access management compliance*
– Focus on compliance related efforts mostly on applications and business units
– Difficult translating policies for IT implementation
– Lack of transparency and accountability
*Ponemon Institute survey on Identity Compliance
6 © Happiest Minds – Confidential
Identity and Access Management -
Key Market observations and Issues with Solutions
 IAG has put burden on Organization – Supervisors, business and application owners, compliance personnel spend
lot of time to perform simple governance activities as existing solutions natively do not facilitate targeted and
focused governance activities.
 Compliance is not a periodic activity– Existing solutions treat access governance as a periodic activity, so the risk to
the organization is directly related to frequency of governance activities.
 The move to the Cloud – Organizations are moving to cloud solutions for their business processes and this has
magnified the problem of user access management. Existing solutions are retro-fitting their architecture for Cloud
IAM/IAG.
 IAM/IAG investments are prohibitively high – Existing solutions have been designed/marketed/sold with high
infrastructure/planning/deployment cost model. This is preventing smaller organizations to benefit from IAM
solutions.
7 © Happiest Minds – Confidential
IdentityVigil Solution
IdentityVigil –Virtual Appliance – Meant for
enterprises. Hosted and managed through
private cloud. Well suited for customized
solution requirement.
Deployed, managed
and hosted by Happiest
Minds
Cost Effective Pay-
as-you-Go pricing
model
Cloud Identity &
Access
Governance
IdentityVigil – Cloud Hosted Service –
Meant for SMBs, country specific hosting to
meet data privacy requirements.
Identity & Access Governance
Privileged Account
Management
Federation/SSO with Multi-Factor
Authentication
Modules
8 © Happiest Minds – Confidential
Key Features
Access Certification
A Platform for performing scheduled, event-
driven and ad hoc Access Certification.
Access Change Monitoring
A highly scalable engine that can detect,
analyze and notify key access changes across
all applications.
Access Request and Approval
A highly configurable workflow to manage
Access Request and Approval Process.
Access Controls
Simple and easy deployment of regulatory
and Compliance controls.
Extensive Analysis of Asset, Access and User
providing 360 view
Comprehensive analyses across different
dimensions to make the most informed
Governance decisions.
Access Activity Monitoring
Access Activity Monitoring - A comprehensive
analysis and reporting of what users are doing
with the access granted to them.
Fulfilment Engine
Rule based automated provisioning with self
service, password management and compliance
reporting.
9 © Happiest Minds – Confidential
Complete solution to discover, protect, monitor and audit Privileged Accounts!
 Privileged Account Management - Secures privileged identities throughout IT infrastructure including:
Super-user login accounts utilized by individuals to change configuration settings, run programs and
perform other IT administrative duties.
Service accounts that require privileged login IDs and passwords to run.
Application-to-application passwords used by web services, line-of-business applications and custom
software to connect to databases, middleware and more.
 Privileged Session Management isolates, controls, and monitors privileged user access as well as activities for
critical UNIX, Linux, and Windows-based systems, databases etc.
 Support Integration with SIEM and IT Service Management tools
 Auto Discovery ability to reliably discover and secure the widest range of privileged accounts, right out-of-the-
box.
- Privileged Account Management Features
10 © Happiest Minds – Confidential
“All-in-one” SSO solution!
 Federated SSO - Supports Federation services that securely share identity information across heterogeneous
systems or domain boundaries using standard identity protocols (SAML, WS-Federation, OpenID Connect)
 Web SSO supported through a self-contained gateway that protects web applications where installing a policy
agent is not required
 Two-Factor Authentication – Scalable, easy to use, high user adoption Mobile OTP solution
- SSO Features
Thank you.
Please visit us @ http://www.happiestminds.com/identityvigil/

More Related Content

More from Happiest Minds Technologies

More from Happiest Minds Technologies (20)

ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
Contact Centre Growing Digital
Contact Centre Growing DigitalContact Centre Growing Digital
Contact Centre Growing Digital
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Happiest Minds Technologies- IdentityVigil Solution Overview

  • 2. 2 © Happiest Minds – Confidential MonitorandManage(24X7) UserAccessManagement Services Identity & Access Management Services Value Adds => Integration Artifacts (Architecture, design, code ) across multiple products, service delivery framework, process templates, productivity templates, operation process, delivery templates etc. Deploy,Integrate, Customize,virtualize Strategy Roadmap Define Implement Operate Integrate Access Management Platform •SSO & ESSO •Federated SSO •Strong, Risk Based Authentication •Password Management •Social Logins •Entitle management Identity Solution Platform •User Management •Privilege Password Management •Access Governance •Role Management •Identity Intelligence •Segregation of Duties Directory Services Platform •Intranet and Extranet Directory Services •Virtual Directory
  • 3. 3 © Happiest Minds – Confidential© Happiest Minds – Confidential Happiest Minds Credentials in IAG Area Security Practice focused on innovative and disruptive technologies with 170+ members Dedicated IAM Practice with 100+ person years of experience in IAM Innovation and technology led Consulting practice leverages cutting edge tools to optimize time & cost Innovative Delivery Model (Productized Solution Center Model) Continuous Improvement in IAM operations & Application On- Boarding through non-linear execution model CoE contribution for reusable components, templates, artifacts & design patterns for IAM Strong alliance with product vendors to develop best in class solutions Team of 50+ IAM Consultants & Specialist in IAM Experienced team with efficient pre-planning by leveraging the past experience and advanced knowledge base Experienced team that has executed over 20+ large IAM projects across Fortune 500 companies in the past Pre-built use cases for Enterprise wide IAM Productized solutions to expedite IAM rollout process Vast experience in execution Innovation led approach Strong team of IAM Consultants Focused IAM Practice Line
  • 4. 4 © Happiest Minds – Confidential IDENTITYVIGIL – IDENTITY AS A SERVICE OFFERING
  • 5. 5 © Happiest Minds – Confidential Identity and Access Governance - Enterprise Challenges  Reliance on manual processes – 58% of companies use mostly manual methods to monitor identity and access management – Costly and inefficient – Inconsistent and unpredictable outcomes  Exposure to Compliance and Operational risks – Gaps/delays in removing orphan accounts – Privileged account proliferation – Entitlement creep  Inability to Enforce Preventive Controls – Inconsistent and ad hoc change processes – Dependency on “after the fact” detective controls – Reactive approach to handle compliance issues  Gaps Between Business and IT Groups – 87% of the companies employ a decentralized approach to identity and access management compliance* – Focus on compliance related efforts mostly on applications and business units – Difficult translating policies for IT implementation – Lack of transparency and accountability *Ponemon Institute survey on Identity Compliance
  • 6. 6 © Happiest Minds – Confidential Identity and Access Management - Key Market observations and Issues with Solutions  IAG has put burden on Organization – Supervisors, business and application owners, compliance personnel spend lot of time to perform simple governance activities as existing solutions natively do not facilitate targeted and focused governance activities.  Compliance is not a periodic activity– Existing solutions treat access governance as a periodic activity, so the risk to the organization is directly related to frequency of governance activities.  The move to the Cloud – Organizations are moving to cloud solutions for their business processes and this has magnified the problem of user access management. Existing solutions are retro-fitting their architecture for Cloud IAM/IAG.  IAM/IAG investments are prohibitively high – Existing solutions have been designed/marketed/sold with high infrastructure/planning/deployment cost model. This is preventing smaller organizations to benefit from IAM solutions.
  • 7. 7 © Happiest Minds – Confidential IdentityVigil Solution IdentityVigil –Virtual Appliance – Meant for enterprises. Hosted and managed through private cloud. Well suited for customized solution requirement. Deployed, managed and hosted by Happiest Minds Cost Effective Pay- as-you-Go pricing model Cloud Identity & Access Governance IdentityVigil – Cloud Hosted Service – Meant for SMBs, country specific hosting to meet data privacy requirements. Identity & Access Governance Privileged Account Management Federation/SSO with Multi-Factor Authentication Modules
  • 8. 8 © Happiest Minds – Confidential Key Features Access Certification A Platform for performing scheduled, event- driven and ad hoc Access Certification. Access Change Monitoring A highly scalable engine that can detect, analyze and notify key access changes across all applications. Access Request and Approval A highly configurable workflow to manage Access Request and Approval Process. Access Controls Simple and easy deployment of regulatory and Compliance controls. Extensive Analysis of Asset, Access and User providing 360 view Comprehensive analyses across different dimensions to make the most informed Governance decisions. Access Activity Monitoring Access Activity Monitoring - A comprehensive analysis and reporting of what users are doing with the access granted to them. Fulfilment Engine Rule based automated provisioning with self service, password management and compliance reporting.
  • 9. 9 © Happiest Minds – Confidential Complete solution to discover, protect, monitor and audit Privileged Accounts!  Privileged Account Management - Secures privileged identities throughout IT infrastructure including: Super-user login accounts utilized by individuals to change configuration settings, run programs and perform other IT administrative duties. Service accounts that require privileged login IDs and passwords to run. Application-to-application passwords used by web services, line-of-business applications and custom software to connect to databases, middleware and more.  Privileged Session Management isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases etc.  Support Integration with SIEM and IT Service Management tools  Auto Discovery ability to reliably discover and secure the widest range of privileged accounts, right out-of-the- box. - Privileged Account Management Features
  • 10. 10 © Happiest Minds – Confidential “All-in-one” SSO solution!  Federated SSO - Supports Federation services that securely share identity information across heterogeneous systems or domain boundaries using standard identity protocols (SAML, WS-Federation, OpenID Connect)  Web SSO supported through a self-contained gateway that protects web applications where installing a policy agent is not required  Two-Factor Authentication – Scalable, easy to use, high user adoption Mobile OTP solution - SSO Features
  • 11. Thank you. Please visit us @ http://www.happiestminds.com/identityvigil/

Editor's Notes

  1. a highly scalable, modular, easy to deploy architecture that includes Authentication, SSO, Authorization, Federation, Entitlements, Adaptive Authentication, Strong Authentication, and Web Services Security - in a single, unified product Cloud dashboard, enables SSO of web applications by simply clicking an SaaS service icon increasing user productivity and improving security Simple click through setup of Federation IDP and SPs using SAML, OpenID Connect and OAuth 2.0. All major federation protocols: SAML 1.x, SAML 2.0 (SP, IdP, ECP, and IdP Proxy), WS-Federation (asserting, relying party) Next gen-federation standards for cloud and mobile include full implementation of OpenID Connect and OAuth 2.0 (consumer, provider, authorization server).