SlideShare a Scribd company logo
Sun Identity Suite How it all ties together Vijay Subramanian [email_address] 630-521-8934 Oct 23, 2008 www.laurustech.com
Who is Laurus? ,[object Object],[object Object]
The Laurus Advantage:  Our Technical & Engineering Team Laurus makes significant investments in building the best team of consultants and engineers in the industry. Steady and Substantial growth  Consultants & Engineers  fill our ranks
Laurus Overview:  Breadth of Solution Set Systems Integration Security & Compliance Bus. Apps. Bus. Strategy Client Executives & Talent Solutions - Servers & Storage - Capacity Planning - Virtualization & Consolidation - Backup & Recovery - Business Continuity / Disaster recovery - Migrations - Datacenter Assessments - High Availability - Data Replication - Audit Reporting - Identity Management - User Provisioning - Data Protection - Single Sign-On - Role Based Access Control ,[object Object],[object Object],[object Object],- Consultants in Business Optimization ,[object Object],[object Object],[object Object]
Security Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sun Identity Suite How it all ties together
IAM EVOLUTION Identity Suite Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tying it all together
Sweet Spots
Security Information & Event Management
Where do I start? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IDM Roadmap Document
Business Drivers Security Efficiency Business  Enablement Compliance ,[object Object],[object Object],Segregation of Duties Approval & Audit trail Inappropriate access Security policy  enforcement Untimely termination Manage growing system  portfolio ,[object Object],[object Object],Slow on-boarding External user  experience Revenue generation
Next Steps ,[object Object],Michelle Burger  Director, Software Sales [email_address]   Office:  630.521.8944 Cell:  847.977.4268 Laurus Technologies Toll Free: 1-877-LAURUS 1  1015 Hawthorn Drive Itasca, IL 60143
 

More Related Content

What's hot

Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Resolver Inc.
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
hardik soni
 
SMART overview_ESG risk
SMART overview_ESG riskSMART overview_ESG risk
SMART overview_ESG riskPaul Wenman
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
EC-Council
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
Unified11
 
Prevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | SymmetryPrevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | Symmetry
Symmetry™
 
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle AppsSroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Jane Jones
 
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
Corporater
 
Ags001 Wilhoit 091707
Ags001 Wilhoit 091707Ags001 Wilhoit 091707
Ags001 Wilhoit 091707
Dreamforce07
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
3Sixty Insights
 
Blue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the FutureBlue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the Future
3Sixty Insights
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trinings
 
third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
SALIH AHMED ISLAM
 

What's hot (18)

Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
SOC Models Comparison
SOC Models ComparisonSOC Models Comparison
SOC Models Comparison
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
SMART overview_ESG risk
SMART overview_ESG riskSMART overview_ESG risk
SMART overview_ESG risk
 
OAM Best Practises
OAM Best PractisesOAM Best Practises
OAM Best Practises
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Prevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | SymmetryPrevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | Symmetry
 
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle AppsSroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
 
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
10 Observations on Using Technology for SMCR - Senior Managers and Certificat...
 
Ags001 Wilhoit 091707
Ags001 Wilhoit 091707Ags001 Wilhoit 091707
Ags001 Wilhoit 091707
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
avanti
avantiavanti
avanti
 
Blue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the FutureBlue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the Future
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
 

Similar to How It All Ties Together Sun Idm Roadshow For Sun

SAP GRC
SAP GRC SAP GRC
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
Happiest Minds Technologies
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
danhsmith
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
Mantala
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
E Team Corporate Presentation Capgemini
E Team Corporate Presentation   CapgeminiE Team Corporate Presentation   Capgemini
E Team Corporate Presentation Capgeminiguest85695cbe
 
E Team Corporate Presentation Capgemini
E Team Corporate Presentation   CapgeminiE Team Corporate Presentation   Capgemini
E Team Corporate Presentation Capgemini
guest85695cbe
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
jayallen77
 
Métier software solutions private limited
Métier software solutions private limitedMétier software solutions private limited
Métier software solutions private limited
Metier Software Solutions
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
WithumSmith+Brown, formerly Portal Solutions
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentationprashantjky
 
Initiate - Presentation to Salesforce CIO Council
Initiate - Presentation to Salesforce CIO CouncilInitiate - Presentation to Salesforce CIO Council
Initiate - Presentation to Salesforce CIO Council
Scott Carruth
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
M INTERGRAPH SYSTEMS PRIVATE LIMITED
 
Hanu's Security Services
Hanu's Security ServicesHanu's Security Services
Hanu's Security Services
BhupendraGupta35
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
Appsian
 

Similar to How It All Ties Together Sun Idm Roadshow For Sun (20)

SAP GRC
SAP GRC SAP GRC
SAP GRC
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
E Team Corporate Presentation Capgemini
E Team Corporate Presentation   CapgeminiE Team Corporate Presentation   Capgemini
E Team Corporate Presentation Capgemini
 
E Team Corporate Presentation Capgemini
E Team Corporate Presentation   CapgeminiE Team Corporate Presentation   Capgemini
E Team Corporate Presentation Capgemini
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
Métier software solutions private limited
Métier software solutions private limitedMétier software solutions private limited
Métier software solutions private limited
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentation
 
Initiate - Presentation to Salesforce CIO Council
Initiate - Presentation to Salesforce CIO CouncilInitiate - Presentation to Salesforce CIO Council
Initiate - Presentation to Salesforce CIO Council
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
 
Hanu's Security Services
Hanu's Security ServicesHanu's Security Services
Hanu's Security Services
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 

How It All Ties Together Sun Idm Roadshow For Sun

Editor's Notes

  1. 12/15/10