SlideShare a Scribd company logo
1 of 11
Identity, Security and Healthcare:
Customer Success
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.2
“Now that we do not have to input employee
profile information manually, we are able to add
new recruits to the system up to five times
faster than before, considering that since we
have adopted Identity Manager we have grown
from 3,000 to 15,000 users, you can imagine
what an indispensable advantage this is!”
Jerry van Rekom Head of ICT, Carante Groep
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.3
“Without this type of security solution in place,
a user could log in using someone else's
credentials to access records they shouldn't be
and there would be no way of verifying who was
actually in the system, SecureLogin helps
prevent those kinds of problems.”
Nicholas Ivon
Director of Information Systems, Clark & Daughtrey
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.4
“When we update some aspect of a user’s
information, the change is automatically and
instantly propagated to all connected
systems...”
Gianfranco Scocco
IT Manager, Coopservice Group
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.5
“The biggest benefit with SecureLogin has really
been the reduction in user frustration. We are no
longer at odds with our users over moving
forward with advanced clinical applications
because they know we can continue to provide
them with simple, easy access”
Jim Hauenstein
CIO , Enloe Medical Center
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.6
“It would be very difficult to live without
NetIQ Directory and Resource Administrator.”
Kelley Ealy
Security Analyst, Kindred Healthcare
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.7
“Identity Manager will save us huge amounts of
time and effort, and will also ensure that new
users are given access to the information they
need right away.”
Eppe Wolfis
IT Manager, Lentis
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.8
“The NetIQ solution gives the Trust the tools to
work more efficiently and ensure only authorized
employees gain access to confidential
information. Ultimately, this enables us to provide
a better service to our patients and make
savings, which we can spend on developing
new health services.”
Daniel Grogan
i-services Supervisor, The Mid Yorkshire Hospitals NHS Trust
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.9
“After exploring a number of solutions, we
determined that NetIQ could deliver the best
integrated and automated solution for
implementing IT controls, delegated
administration, comprehensive reporting and
troubleshooting. With NetIQ, we can standardize
on a single solution and increase reliability and
accuracy while reducing our own workload—
ultimately enabling us to deliver maximum value
to our customers.”
Ron Piper
Technology Services, Prime Care Technologies
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.10
“NetIQ Group Policy Administrator beats the
daylights out of the native tools.”
Guy Pierre
Network Administrator, Good Samaritan Hospital
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.11
+1 713.548.1700 (Worldwide)
888.323.6768 (Toll-free)
info@netiq.com
NetIQ.com
Worldwide Headquarters
1233 West Loop South
Suite 810
Houston, TX 77027 USA
http://community.netiq.com

More Related Content

What's hot

Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20Kasia Szkuta
 
Cloud Methodology and Facts
Cloud Methodology and FactsCloud Methodology and Facts
Cloud Methodology and FactsCSI Solutions
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - InfographicAccenture Technology
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The CloudBuilding Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The CloudDell World
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Operations
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
 
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineCryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineMassimo Bertaccini
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Mike Davis
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven cultureHow to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven cultureShahid Shah
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
HealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health systemHealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health systemMark Scrimshire
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 

What's hot (20)

Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20
 
Cloud Methodology and Facts
Cloud Methodology and FactsCloud Methodology and Facts
Cloud Methodology and Facts
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The CloudBuilding Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineCryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven cultureHow to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven culture
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
HealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health systemHealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health system
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 

Similar to HIMSS2014 Conference - Customer Slides

Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
adventist-health-en
adventist-health-enadventist-health-en
adventist-health-enShawn Mayhew
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015bmcmenemy
 
8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned Smartphones8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned SmartphonesIntel IT Center
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...ThousandEyes
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024The Digital Insurer
 
Cyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online PresenceCyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online PresenceCybercops
 
Fragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHSFragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHSnexthink
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipNetskope
 
Turn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-TeamTurn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-TeamAngela Tuminello
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeRevenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeShahid Shah
 
complywise_newsletter2009
complywise_newsletter2009complywise_newsletter2009
complywise_newsletter2009Neil Ridsdale
 

Similar to HIMSS2014 Conference - Customer Slides (20)

Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
adventist-health-en
adventist-health-enadventist-health-en
adventist-health-en
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned Smartphones8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned Smartphones
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
 
Cyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online PresenceCyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online Presence
 
Fragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHSFragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHS
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Turn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-TeamTurn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-Team
 
Hello__We_are_ITS
Hello__We_are_ITSHello__We_are_ITS
Hello__We_are_ITS
 
Hello. We are ITS
Hello. We are ITSHello. We are ITS
Hello. We are ITS
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeRevenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data deluge
 
complywise_newsletter2009
complywise_newsletter2009complywise_newsletter2009
complywise_newsletter2009
 

More from Michele Hudnall

2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments FailMichele Hudnall
 
2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDBMichele Hudnall
 
2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITIL2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITILMichele Hudnall
 
2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy Industry2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy IndustryMichele Hudnall
 
2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and Resume2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and ResumeMichele Hudnall
 
BrainShare 2014 - Partners
BrainShare 2014 - PartnersBrainShare 2014 - Partners
BrainShare 2014 - PartnersMichele Hudnall
 
2011 07 Cloud Service Contracts Get Stormy Final
2011 07  Cloud Service Contracts Get Stormy Final2011 07  Cloud Service Contracts Get Stormy Final
2011 07 Cloud Service Contracts Get Stormy FinalMichele Hudnall
 
Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!Michele Hudnall
 

More from Michele Hudnall (8)

2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
 
2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB
 
2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITIL2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITIL
 
2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy Industry2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy Industry
 
2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and Resume2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and Resume
 
BrainShare 2014 - Partners
BrainShare 2014 - PartnersBrainShare 2014 - Partners
BrainShare 2014 - Partners
 
2011 07 Cloud Service Contracts Get Stormy Final
2011 07  Cloud Service Contracts Get Stormy Final2011 07  Cloud Service Contracts Get Stormy Final
2011 07 Cloud Service Contracts Get Stormy Final
 
Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

HIMSS2014 Conference - Customer Slides

  • 1. Identity, Security and Healthcare: Customer Success
  • 2. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.2 “Now that we do not have to input employee profile information manually, we are able to add new recruits to the system up to five times faster than before, considering that since we have adopted Identity Manager we have grown from 3,000 to 15,000 users, you can imagine what an indispensable advantage this is!” Jerry van Rekom Head of ICT, Carante Groep
  • 3. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.3 “Without this type of security solution in place, a user could log in using someone else's credentials to access records they shouldn't be and there would be no way of verifying who was actually in the system, SecureLogin helps prevent those kinds of problems.” Nicholas Ivon Director of Information Systems, Clark & Daughtrey
  • 4. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.4 “When we update some aspect of a user’s information, the change is automatically and instantly propagated to all connected systems...” Gianfranco Scocco IT Manager, Coopservice Group
  • 5. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.5 “The biggest benefit with SecureLogin has really been the reduction in user frustration. We are no longer at odds with our users over moving forward with advanced clinical applications because they know we can continue to provide them with simple, easy access” Jim Hauenstein CIO , Enloe Medical Center
  • 6. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.6 “It would be very difficult to live without NetIQ Directory and Resource Administrator.” Kelley Ealy Security Analyst, Kindred Healthcare
  • 7. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.7 “Identity Manager will save us huge amounts of time and effort, and will also ensure that new users are given access to the information they need right away.” Eppe Wolfis IT Manager, Lentis
  • 8. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.8 “The NetIQ solution gives the Trust the tools to work more efficiently and ensure only authorized employees gain access to confidential information. Ultimately, this enables us to provide a better service to our patients and make savings, which we can spend on developing new health services.” Daniel Grogan i-services Supervisor, The Mid Yorkshire Hospitals NHS Trust
  • 9. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.9 “After exploring a number of solutions, we determined that NetIQ could deliver the best integrated and automated solution for implementing IT controls, delegated administration, comprehensive reporting and troubleshooting. With NetIQ, we can standardize on a single solution and increase reliability and accuracy while reducing our own workload— ultimately enabling us to deliver maximum value to our customers.” Ron Piper Technology Services, Prime Care Technologies
  • 10. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.10 “NetIQ Group Policy Administrator beats the daylights out of the native tools.” Guy Pierre Network Administrator, Good Samaritan Hospital
  • 11. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.11 +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA http://community.netiq.com