John Bernhard will present on identity management at Airline Company. Identity management (IdM) provides a federated infrastructure to manage access for employees, contractors, business partners, and customers. It aims to consistently enforce business and security policies regardless of how users access the network. IdM gives Airline Company competitive advantages like an agile infrastructure and enables compliance with regulations like SOX and PCI. The presentation will cover what IdM is, the business rationale and benefits, and IdM service architecture concepts.
Identity and Access Management - Data modeling conceptsAlain Huet
The document discusses identity and access management (IAM) data modeling. It outlines the basics of IAM data modeling including defining the IAM data model, management functions, and common paradigms. The IAM data model groups users, technical resources, logical functions, and profiles to define user access rights. Effective IAM implementation requires mapping the data model to IT systems and consolidating administration tools while ensuring quality management. Common IAM paradigms include discretionary access control, mandatory access control, role-based access control, and organization-based access control.
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
This document provides an overview of identity and access management (IAM) concepts. IAM involves managing digital identities and the access provided through them. Key components include establishing unique identities, authorizing access to entitlements through roles, approving access requests, reviewing access through certifications, and provisioning/deprovisioning access. The document also describes how an IAM framework works, including how identities request access, roles and rules are managed, access is aggregated and provisioned to target systems, and certifications are performed to review access. It provides SailPoint as an example of a leading IAM tool.
This reference architecture outlines a general solution for a centralized Identity Management (IdM) system without
committing itself to any specific business needs.
This document introduces the business problems of user life-cycle management: slow and complex onboarding; redundant administration effort; slow and unreliable deactivation; excess security entitlements and inconsistent user profile data. It then describes how Hitachi ID Identity Manager addresses these problems using streamlined business processes built on integrated technology. Finally, the benefits of enabling automation and self-service to improve user and security management processes are described.
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
Profesia, Lynx Group, presenta la terza puntata di masterclass sulla tecnologia WSO2 di cui è Distributore esclusivo per l'Italia.
Autenticazione e autorizzazione, riconoscimento e abilitazione all'accesso. L'Identity server è uno strumento in grado di gestire l'autenticazione dei vostri utenti, interni ed esterni , di gestire le sessioni di login e di effettuare autenticazioni mirate al contesto applicativo. È consigliabile prediligere sempre un prodotto on-premise o in cloud compatible GDPR che supporta protocolli SAML e oAuth2 e permette la federazione con i maggiori IDP social.
Se stai pensando a una trasformazione digitale per evolvere verso un business agile scrivi a contact@profesia.it e parla con uno dei nostri esperti
This document provides an overview of OpenIDM, an open source identity management solution. It describes OpenIDM's features including role-based provisioning, high availability support, and workflow improvements. It also provides information on installing OpenIDM, supported connectors, browsers, operating systems, limitations, where to find help and support, and links to additional OpenIDM resources.
Sailpoint Training is an innovative identity management solution. Best Sailpoint IdentityIQ Online Training gives sailpoint 7.1 version & corporate training
Identity and Access Management - Data modeling conceptsAlain Huet
The document discusses identity and access management (IAM) data modeling. It outlines the basics of IAM data modeling including defining the IAM data model, management functions, and common paradigms. The IAM data model groups users, technical resources, logical functions, and profiles to define user access rights. Effective IAM implementation requires mapping the data model to IT systems and consolidating administration tools while ensuring quality management. Common IAM paradigms include discretionary access control, mandatory access control, role-based access control, and organization-based access control.
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
This document provides an overview of identity and access management (IAM) concepts. IAM involves managing digital identities and the access provided through them. Key components include establishing unique identities, authorizing access to entitlements through roles, approving access requests, reviewing access through certifications, and provisioning/deprovisioning access. The document also describes how an IAM framework works, including how identities request access, roles and rules are managed, access is aggregated and provisioned to target systems, and certifications are performed to review access. It provides SailPoint as an example of a leading IAM tool.
This reference architecture outlines a general solution for a centralized Identity Management (IdM) system without
committing itself to any specific business needs.
This document introduces the business problems of user life-cycle management: slow and complex onboarding; redundant administration effort; slow and unreliable deactivation; excess security entitlements and inconsistent user profile data. It then describes how Hitachi ID Identity Manager addresses these problems using streamlined business processes built on integrated technology. Finally, the benefits of enabling automation and self-service to improve user and security management processes are described.
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
Profesia, Lynx Group, presenta la terza puntata di masterclass sulla tecnologia WSO2 di cui è Distributore esclusivo per l'Italia.
Autenticazione e autorizzazione, riconoscimento e abilitazione all'accesso. L'Identity server è uno strumento in grado di gestire l'autenticazione dei vostri utenti, interni ed esterni , di gestire le sessioni di login e di effettuare autenticazioni mirate al contesto applicativo. È consigliabile prediligere sempre un prodotto on-premise o in cloud compatible GDPR che supporta protocolli SAML e oAuth2 e permette la federazione con i maggiori IDP social.
Se stai pensando a una trasformazione digitale per evolvere verso un business agile scrivi a contact@profesia.it e parla con uno dei nostri esperti
This document provides an overview of OpenIDM, an open source identity management solution. It describes OpenIDM's features including role-based provisioning, high availability support, and workflow improvements. It also provides information on installing OpenIDM, supported connectors, browsers, operating systems, limitations, where to find help and support, and links to additional OpenIDM resources.
Sailpoint Training is an innovative identity management solution. Best Sailpoint IdentityIQ Online Training gives sailpoint 7.1 version & corporate training
Intel IT's Identity and Access Management JourneyIntel IT Center
Intel IT's identity and access management journey involved moving from a 20-year old custom solution to a new agile approach using a small set of off-the-shelf solutions and web services. The goals were to provide simple, easy, and controlled access from any device or location while improving user experience, flexibility, and risk mitigation. A high-level reference architecture was proposed using core identity management services, entitlement management, authentication, and authorization federated through cloud applications. A co-existence strategy would transition applications gradually to the new platform while treating the legacy system as a managed source. Significant progress had been made but more work remained to fully achieve the vision.
This document discusses identity and access management solutions using Forefront Identity Manager 2010. It describes how FIM 2010 can automate user provisioning and deprovisioning, manage credentials and groups, implement security policies, and provide self-service identity management portals. FIM 2010 integrates with directories, applications, and devices to synchronize identity data and apply policies consistently across heterogeneous environments.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
This document provides an overview of IBM's Identity and Access Management (IAM) product portfolio, including IBM Security Identity Manager, IBM Security Privileged Identity Manager, and IBM Security Access Manager. It discusses how these products help customers secure access, streamline user provisioning and access requests, safeguard access in cloud/SaaS environments, address compliance needs, and centrally manage privileged identities. Specific capabilities highlighted include identity lifecycle management, self-service access requests, centralized password management, account reconciliation, access recertification, reporting for audits, and broad application integration.
Sailpoint Training by expert consultants with hands-on. Join for Sailpoint IdentityIQ Online Training with us. we deliver corporate training for sailpoint"
Identity and access management (IAM) involves managing user accounts, access to systems and applications, and user lifecycles. It encompasses provisioning, managing, and removing access when employees join, change roles, or leave an organization. IAM aims to streamline access management, improve security and compliance, and integrate user data across different systems using standards like LDAP, RBAC, SSO and federation. Successful IAM requires aligning technical solutions with business processes, change management, and ongoing auditing to ensure appropriate access controls.
In April, C/D/H presented on identity management, specifically comparing Microsoft, Novell, Courion, Oracle/Sun, and IBM.
Download the slide deck for an overview of the solutions and their strengths and weaknesses. You'll also find out more about out-of-the-box vs. add-on functionality, integration capabilities, and rough cost comparisons.
And last but not least, the factors in determining the solution that's right for you.
This document provides an overview of SAP NetWeaver Identity Management. It discusses Identity Management's role in centralizing user information and provisioning access. Key features covered include provisioning workflows, reporting and auditing, business roles, and integration with Access Control/GRC and Single Sign On. The presentation also reviews Identity Center and Virtual Directory Server, the two main components of SAP Identity Management.
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM) to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
This document discusses identity and access management (IAM) programs that can help secure data in modern enterprises. It outlines why identity has become central to security and notes that recent high-profile data breaches involved compromised credentials. The document recommends implementing IAM programs around user management, entitlement management, privileged access management and federation. It also discusses emerging standards like OAuth 2.0, SCIM and OpenID Connect that can help improve security and management of identities.
ITIL v3 defines access management as the process of granting authorized users the right to use a service, while preventing access to non-authorized users. Access management enables users to use services documented in the service catalog. It manages identity, access rights, services, and uses directory services to manage access and rights. The goal is to provide users the right level of access to services according to defined policies and security management.
Experiences in federated access control for UK e-ScienceEduserv Foundation
The document discusses several projects related to federated access control for UK e-science. It describes technologies like role-based access control and attribute certificates that help simplify access management across multiple institutions. Specific projects mentioned aim to improve authentication, authorization, and secure linkage of distributed resources through standards like Shibboleth and technologies like attribute authorities. Challenges remain around digital certificate handling, centralized versus distributed user information management, and balancing automation with user convenience.
The document discusses the benefits of implementing an Identity and Access Management (IAM) system from the perspectives of various CXOs. It outlines common issues they face such as high costs of manual user provisioning and access management, ghost accounts, and inability to easily comply with regulations. The document then provides examples of how an IAM system can help address these issues through features such as automated user provisioning, access certification, and single sign-on. It estimates potential cost savings from reduced IT costs, increased productivity, and avoided risks.
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
SAP Identity Management helps companies centrally manage their user accounts (identities) in a complex system landscape, including both SAP and non-SAP systems. More information: http://scn.sap.com/community/idm.
Sailpoint Online Training on IAM overviewITJobZone.biz
Sailpoint Online Training for Identity and Access Overview. Learn Sailpoint Basics from the best Trainer. Get Sailpoint Training From the Sailpoint Consultant and a professional trainer
Con 8810 who should have access to what - finalOracleIDM
The document outlines an agenda for a session on identity governance and risk management. The session goals are to understand current market trends in access compliance and risk management, learn the benefits of an identity governance platform for managing risks, and hear from customers about their experiences. The agenda includes discussions of market trends driving needs for improved access management, how Oracle Identity Governance can help with risk management and compliance needs, and a customer panel discussion.
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Rethink IT. Reinvent Business. - Dharanibalan GurunathanJyothi Satyanathan
The document is an agenda for an IBM event taking place from November 22-24, 2012 in Jaipur, India. It discusses increasing pressures on businesses to deliver value with limited resources, and how forward-thinking CIOs are forging strategic partnerships to help IT deliver true business value. The event will focus on how IBM can help organizations improve employee mobility, manage data and infrastructure, ensure business continuity, and leverage the right mix of traditional IT, managed services, and cloud solutions.
IDBI Intech Limited is an IT solutions and consulting firm focused on the BFSI sector. They have over 1000 technology experts with 15+ years of experience on average. They offer comprehensive IT consulting services, information security consulting, corporate learning and development programs, and business process outsourcing. Their offerings include both technology consulting services and proprietary products tailored for the financial sector. They have worked with several large banks and insurance companies in India, helping them optimize processes, launch new digital initiatives, and improve business metrics like lead conversion rates.
Intel IT's Identity and Access Management JourneyIntel IT Center
Intel IT's identity and access management journey involved moving from a 20-year old custom solution to a new agile approach using a small set of off-the-shelf solutions and web services. The goals were to provide simple, easy, and controlled access from any device or location while improving user experience, flexibility, and risk mitigation. A high-level reference architecture was proposed using core identity management services, entitlement management, authentication, and authorization federated through cloud applications. A co-existence strategy would transition applications gradually to the new platform while treating the legacy system as a managed source. Significant progress had been made but more work remained to fully achieve the vision.
This document discusses identity and access management solutions using Forefront Identity Manager 2010. It describes how FIM 2010 can automate user provisioning and deprovisioning, manage credentials and groups, implement security policies, and provide self-service identity management portals. FIM 2010 integrates with directories, applications, and devices to synchronize identity data and apply policies consistently across heterogeneous environments.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
This document provides an overview of IBM's Identity and Access Management (IAM) product portfolio, including IBM Security Identity Manager, IBM Security Privileged Identity Manager, and IBM Security Access Manager. It discusses how these products help customers secure access, streamline user provisioning and access requests, safeguard access in cloud/SaaS environments, address compliance needs, and centrally manage privileged identities. Specific capabilities highlighted include identity lifecycle management, self-service access requests, centralized password management, account reconciliation, access recertification, reporting for audits, and broad application integration.
Sailpoint Training by expert consultants with hands-on. Join for Sailpoint IdentityIQ Online Training with us. we deliver corporate training for sailpoint"
Identity and access management (IAM) involves managing user accounts, access to systems and applications, and user lifecycles. It encompasses provisioning, managing, and removing access when employees join, change roles, or leave an organization. IAM aims to streamline access management, improve security and compliance, and integrate user data across different systems using standards like LDAP, RBAC, SSO and federation. Successful IAM requires aligning technical solutions with business processes, change management, and ongoing auditing to ensure appropriate access controls.
In April, C/D/H presented on identity management, specifically comparing Microsoft, Novell, Courion, Oracle/Sun, and IBM.
Download the slide deck for an overview of the solutions and their strengths and weaknesses. You'll also find out more about out-of-the-box vs. add-on functionality, integration capabilities, and rough cost comparisons.
And last but not least, the factors in determining the solution that's right for you.
This document provides an overview of SAP NetWeaver Identity Management. It discusses Identity Management's role in centralizing user information and provisioning access. Key features covered include provisioning workflows, reporting and auditing, business roles, and integration with Access Control/GRC and Single Sign On. The presentation also reviews Identity Center and Virtual Directory Server, the two main components of SAP Identity Management.
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM) to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
This document discusses identity and access management (IAM) programs that can help secure data in modern enterprises. It outlines why identity has become central to security and notes that recent high-profile data breaches involved compromised credentials. The document recommends implementing IAM programs around user management, entitlement management, privileged access management and federation. It also discusses emerging standards like OAuth 2.0, SCIM and OpenID Connect that can help improve security and management of identities.
ITIL v3 defines access management as the process of granting authorized users the right to use a service, while preventing access to non-authorized users. Access management enables users to use services documented in the service catalog. It manages identity, access rights, services, and uses directory services to manage access and rights. The goal is to provide users the right level of access to services according to defined policies and security management.
Experiences in federated access control for UK e-ScienceEduserv Foundation
The document discusses several projects related to federated access control for UK e-science. It describes technologies like role-based access control and attribute certificates that help simplify access management across multiple institutions. Specific projects mentioned aim to improve authentication, authorization, and secure linkage of distributed resources through standards like Shibboleth and technologies like attribute authorities. Challenges remain around digital certificate handling, centralized versus distributed user information management, and balancing automation with user convenience.
The document discusses the benefits of implementing an Identity and Access Management (IAM) system from the perspectives of various CXOs. It outlines common issues they face such as high costs of manual user provisioning and access management, ghost accounts, and inability to easily comply with regulations. The document then provides examples of how an IAM system can help address these issues through features such as automated user provisioning, access certification, and single sign-on. It estimates potential cost savings from reduced IT costs, increased productivity, and avoided risks.
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
SAP Identity Management helps companies centrally manage their user accounts (identities) in a complex system landscape, including both SAP and non-SAP systems. More information: http://scn.sap.com/community/idm.
Sailpoint Online Training on IAM overviewITJobZone.biz
Sailpoint Online Training for Identity and Access Overview. Learn Sailpoint Basics from the best Trainer. Get Sailpoint Training From the Sailpoint Consultant and a professional trainer
Con 8810 who should have access to what - finalOracleIDM
The document outlines an agenda for a session on identity governance and risk management. The session goals are to understand current market trends in access compliance and risk management, learn the benefits of an identity governance platform for managing risks, and hear from customers about their experiences. The agenda includes discussions of market trends driving needs for improved access management, how Oracle Identity Governance can help with risk management and compliance needs, and a customer panel discussion.
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Rethink IT. Reinvent Business. - Dharanibalan GurunathanJyothi Satyanathan
The document is an agenda for an IBM event taking place from November 22-24, 2012 in Jaipur, India. It discusses increasing pressures on businesses to deliver value with limited resources, and how forward-thinking CIOs are forging strategic partnerships to help IT deliver true business value. The event will focus on how IBM can help organizations improve employee mobility, manage data and infrastructure, ensure business continuity, and leverage the right mix of traditional IT, managed services, and cloud solutions.
IDBI Intech Limited is an IT solutions and consulting firm focused on the BFSI sector. They have over 1000 technology experts with 15+ years of experience on average. They offer comprehensive IT consulting services, information security consulting, corporate learning and development programs, and business process outsourcing. Their offerings include both technology consulting services and proprietary products tailored for the financial sector. They have worked with several large banks and insurance companies in India, helping them optimize processes, launch new digital initiatives, and improve business metrics like lead conversion rates.
The document discusses the role of the CIO in turbulent times and opportunities for CIOs to transform businesses through IT-enabled changes. It identifies three key areas for CIOs to focus on: optimizing IT costs while enabling lower business costs and better quality, increasing strategic focus on business relationships, information strategy, and enterprise architecture, and balancing enterprise risk with business demands through appropriate continuity planning. The document provides advice on industrializing IT operations, managing challenges, and leveraging technologies and alliances to add strategic value as a business enabler.
The government has published a cloud computing strategy that outlines the kinds of cloud services that could be offered and how a government cloud platform might work. The strategy recommends limited use of private cloud, use of public cloud subject to criteria, and use of community cloud where public cloud is not suitable. However, the strategy is missing some key details like a cloud store, readiness criteria, a framework for public vs community cloud assessment, and details on service provisioning and data management.
Enterprise Security Architecture: From access to auditBob Rhubart
Paul Andres' presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
SilverStorm "Credibility and Collaboration to achieve excellence in IT Govern...SilverStormSolutions
"Credibility and Collaboration to achieve excellence in IT Governance"
So how are we at SilverStorm helping CIO´s Transform IT?
For us it´s simple, Transforming IT means raising the credibility of IT to gain the collaboration of others throughout the organization.
The first step: Increase “CREDIBILITY”.
The second step: Increase “COLLABORATION”.
Without “Credibility” there can never be “Collaboration”
We are helping our customers achieve measurable benefits by combing processes, people and technology.
IDBI Intech - RBI Working Group ConsultingIDBI Intech
The RBI Working Group examined issues arising from IT use in banks and made recommendations in 9 areas: IT governance, information security, IS audit, IT operations, IT outsourcing, cyber frauds, business continuity planning, customer awareness programs, and legal aspects. The document discusses RBI penalties against banks for non-compliance and introduces IDBI Intech, which provides compliance consultancy services focusing on the 9 areas to help banks achieve compliance.
IBM's Transformation from Project to Program and Portfolio Management Member Content
- by William C. Britton, PMP
IBM Certified Executive Project Manager
To succeed, a number of project management processes, policies, and organizational constructs were established or reinforced to ensure consistent excellence in service delivery.
The document discusses the role of the Chief Information Officer (CIO) and argues that their role will change in the next 10 years. Currently, the CIO role is often poorly defined and misunderstood. However, CIOs play an important role in developing business and information strategies, managing information as a key asset, and driving innovation and change within organizations. In the future, the CIO may take on more of a leadership role bridging the gap between business and IT to facilitate better information management.
Future Focus Infotech provides IT-HR consulting services, software development, and end-to-end consulting through their TechSearch, TechSource, and TechServ/TechSoft offerings. They have a presence in India, UAE, and the US. The company focuses on strategic technologies like ERP, CRM, .NET, Java, and BI for industries like BFSI, food and beverages, telecom, and manufacturing. Future Focus Infotech is ISO 9001:2008 certified and focuses on sustained growth through innovation, passion for their people, collaborative relationships, financial stability, and improving human resource development.
This document provides an overview of Riskpro, an organization that offers risk management consulting services to mid-large sized companies in India. It discusses Riskpro's mission to be a preferred provider of governance, risk and compliance solutions. The document then outlines some key risks facing the ITES/BPO industry such as high attrition, data security issues, and fraud risk. It presents Riskpro's offerings to address these risks, including processes reviews and improvements, risk assessments, training programs, and advisory services related to areas like Basel II/III, corporate risks, information security, and other risks. Contact information for Riskpro's various office locations is also provided.
The document introduces the BiSL framework, which provides guidance for organizations on business information management (BIM). It discusses how BIM addresses the growing complexity of managing information and IT from a business perspective. The framework consists of best practices across strategic, tactical, and operational levels to help customers effectively govern their relationship with IT suppliers and ensure business information needs are met.
ASL BiSL Foundation (formerly ASL Foundation) has managed ASL and BiSL’s key ideas for several years, and is now developing them further. In doing so, it is seeking to bring business and IT closer together. The supply of information – perhaps by its very nature – needs to take place via an integrated chain.
This document provides an overview of Future Focus Infotech Pvt Ltd, an IT consulting firm. It outlines the company's vision, mission, service offerings including IT consulting, software development, and recruitment management. It also describes the company's presence in India, UAE, and USA, technology focus, pricing models, clients, infrastructure, awards, quality assurance processes, growth strategies, and culture of building lasting relationships.
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
IBM automation systems, such as e-discovery and auto-classification, help financial firms achieve transparency and meet compliance requirements while maximizing the value of your existing content management architecture.
Girnar Software Pvt Ltd is an ISO 9001 certified Indian company founded in 2007 that provides offshore product development and outsourced software development services, employing over 200 people across offices in India and the US, and serving clients in various industries including auto, finance, insurance, ecommerce, and healthcare.
This presentation was given by James Jameson, Business Unit Executive, Business Process & Decision Management, Growth Markets, at Impact 2012 in Mumbai on the 1st of June.
Building an Effective Identity Management StrategyNetIQ
Very few organizations do identity management as effectively as they could.
They have trouble developing effective methods for provisioning new users, de-provisioning old users, updating access privileges as users move around the organization, and automating the user change and configuration processes.
This presentation by identity and access management (IAM) experts, Adrian Lane, CTO and analyst at Securosis, and Rick Wagner, director of product management at NetIQ covered key elements of building a strong IAM strategy and the leading industry practices behind those strategies.
Originally presented as a UBM TechWeb DarkReading webinar the on-demand version will be available at: http://bit.ly/UUABIz until July 1st 2013.
This document summarizes the key points from Sanjeev Bhagowalia's presentation on transforming Hawaii's state government IT and information resource management (IRM). It discusses conducting an assessment that found aging technology and processes, resource shortages, and disconnected efforts across departments. The presentation recommends focusing first on 4 areas: enterprise focus, governance, reengineering business processes, and strengthening technical infrastructure. It identifies candidates for early cross-cutting enterprise solutions and lays out a notional transformation framework and schedule. The goal is providing access to the right information securely and reliably across the state.
Cloud computing is a paradigm evolution that benefits from virtualisation technologies and introduces “everything-as-a-service” as a technical and business concept supported by pay-per-use pricing models. Whilst the on-demand characteristics of this novel paradigm provide revolutionary advances in technical ability, the changes while incorporating this into an IT infrastructure raise many complex problems and risks with regards to auditing. Auditing is the process of tracing and logging significant events the take place during the system run-time for analysis, and can be seen as a vital tool in validating and securing systems.
Similar to Id m what-why-how presentationv2.0 (20)
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Id m what-why-how presentationv2.0
1. Identity Management
The What, Why and How?
Airline Company
Presenting: John Bernhard
Enterprise Architect/Director – Bernhard Enterprise Architectures Pty Ltd
Dated: May 18 , 2007
2. Identity Management
Did you know?
IT cost x dollars per year to maintain name and passwords
There has been a x number of security breaches per year
Significant Fraud instances per year
Cost and time for audits
New
N application, however a simple set up of user access appears t
li ti h i l t f to
cost and takes significant resources and very complex
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 2
3. Identity Management
Thesis
Identity management (IdM) is a pervasive and federated infrastructure that
transforms business relationships by managing access for the proper entities to
the proper resources, both for the enterprise and our customers
The goal of an IdM service foundation is to consistently enforce business and
security policies, regardless of network entry point by employees, contractors,
business partners, and customers.
Enterprises need to map their IdM strategy and align it with their business goals
Identity management (IdM) gives Airline Company a competitive advantage
Identity management (IdM) enables Airline Company agile infrastructure
Should be a service to the whole enterprise/internet extension
Idm is not a single product – it is everywhere in the organisation today
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 3
4. Identity Management
Agenda
WHAT – What is IdM?
Introduction
What is Identity Management
Key Concepts and Principles
Overview current state of IdM within Airline Company
Conceptual Architecture – Current State
WHY – Rationale, Drivers and Benefits
Business & Technical perspective
B i T h i l ti
IdM Case study
HOW – IdM Services Architecture
Conceptual Architecture - Provisioning
Conceptual Architecture – Access Management
Compliancy (SOX 404, COBIT and ITIL)
Programme of Work - Identity Service
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 4
5. Identity Management
WHAT – What is IdM?
What is Identity Management?
y g
A set of processes, and a supporting infrastructure, for the creation, maintenance,
and use of digital identities
Involves both technology and process
Involves managing unique IDs, attributes, credentials, entitlements
Must enable enterprises to create manageable lifecycles
Must scale from internally facing systems to externally
facing applications and processes
Goal state: Identity Service, infrastructure and authoritative sources, clean
integration across people, process, and technology
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 5
6. Identity Management
WHAT – Wh t i IdM?
What is
The IdM process: managing the identity lifecycle
p g g y y
Registration / • Today IdM is fragmented
creation • Applications, databases, OSs lack a scalable,
Propagation holistic means of managing identity, credentials,
policy across boundaries
• Overlapping repositories, inconsistent policy
frameworks, process discontinuities
Accounts and • Error prone, creates security loopholes, expensive
Accounts and to manageg
policies
li i •
policies The focus on business process, Web services, and
networked applications has put identity on the
front burner
• This is currently managed in the current structure
Termination on a individual application & infrastructure basis
• Infrastructure requirements
Maintenance /
• Extend reach and range
management • Increase scalability, lower costs
• Balance centralized, distributed management via
loose coupling
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 6
7. Identity Management
WHAT – What is IdM?
Beyond directory: IdM requires integrated infrastructure
y y q g
These technologies represent the major
lifecycle management processes involved with
IdM. In addition, audit surrounds these
services for accountability and control
y
IdM technologies
Identity management services
Directory services
Directory Provisioning services
Services Authentication services
Web-based access management
services
Authorisation services
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 7
8. Identity Management
WHAT – Wh t i IdM?
What is
Burton Group’s View of IdM Evolution
p
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 8
9. Identity Management
WHAT – What is IdM?
Directory services are the first step toward IdM for Airline Company
y p p y
Directory services support the other IdM and federated technologies
through:
Repository services for policies, authentication credentials, roles, groups
and rules
Information integration, mapping and referral between the IdM
applications and the enterprise “repositories of record”
Provides standardised LDAP authentication for applications
Provides general purpose storage for IdM applications
Use virtual directory technology to provide a federated identity data
service
Once the directory services are in place, other IdM policies and technologies
can be implemented depending on the business justification required
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 9
10. Identity Management
WHAT – What is IdM?
• Process integration is just as important as the technology
Identity-based
company access
business
applications
Advanced
business
infrastructure
business
process
integration
Meta Directory services
Basic business LDAP Messag- PBX / CTI Security Manage- Object Web
infrastructure Data-
bases directories
d ecto es ing
g VoIP
o /
/PKI ment
e t se ces
services services
Enabling technology network/basic network infrastructure
(network, servers, routers, OS, transport services)
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 10
11. Identity Management
WHAT – What is IdM?
Key Concepts and Principles
y p p
The IdM Service Components Architecture providing an infrastructure that supports the key
Identity services.
Reconciliation / Audit / Compliancy
Provisioning
P i i i
Workflow
Authentication, Authorization and Auditing
Federation
Synchronization
S h i ti
Delegation
Secure Self Service
Password Management
A scalable, re-useable integrated set of business processes supported by the IdM
infrastructure.
Develop an IdM Service foundation of all IdM related elements
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 11
12. Identity Management
WHAT – Wh t i IdM?
What is
Current state with IdM within Airline Company?
Talk about current state
State current issues and problems
Problems:
Help desk, password reset
Provisioning, de-provisioning not really happening
p
Process complexityy
Bullet points on current employee processes
Bullet points on current customer/business partners registration
Admin Overhead
State current overhead in maintaining employee details
State current overhead of aligning current customers details with the
various applications
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 12
13. Identity Management
WHAT – Wh t i IdM?
What is
Current state with IdM within Airline Company?
Identity access not controlled
No current governance or policies in place in relation to IdM
Not well defined “coming on-board” business processes
coming on board
Security issues, “PCI non-compliancy
PCI issue related to IdM
Identity theft – related to Koru, Frequent Flyer Points & Travel card
members
Security Policy – Compliance verification
Auditing:
External Auditors
State auditing issues specifically in relation to SOX 404
issues,
Manual VS Automated
Compliance problem:
very difficult to audit who has access in terms of PCI
SOX CCompliancy, Due diligence
li D dili
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 13
14. Identity Management
WHAT – What is IdM?
Conceptual Architecture: Current State of Identity related Apps/Touch Points
p y pp
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 14
15. Identity Management
WHY – Rationale Drivers and Benefits
Rationale,
Business Drivers for Identity service
*
From an executive’s point of view, the most important business drivers to address via IdM
include:
i l d
Regulatory Compliance Risk Management
• Sarbanes-Oxley (SOX) • Reporting (Custom/Automated)
• COBIT (ITIL Framework) • Terminations
(Business Best Practices) • Policy-based compliance – Adhere to
y p
• PCI Policy
• GAAP (third-party audit) • Audit management
Business Need Cost Containment (Internal/External)
• External users’ access Operational • Cost reduction/avoidance
• Employee personalisation efficiency • Common architecture
• Outsourcing • Productivity savings
• New Products – Services
(Time To Market) Operational Efficiency
• Improved SLAs Need to tie i t B i
N d t ti into Business Strategy
St t
• Enhanced user experience
*
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 15
16. Identity Management
WHY – Rationale, Drivers and Benefits
IdM Infrastructure Benefits
Improved User Experience Cost savings
Hard-dollar
Hard dollar savings
• Improves employee efficiency • Helpdesk password resets easily measured
• Strengthens customer retention
• Avoids admin. duty duplication
• Minimises errors
• Eliminates redundant software and solutions
• Clarifies business processes
Soft-dollar savings
• Improved user productivity
• Avoids hidden administrative costs
Security: Lifecycle
Identity Administration Security: Policy
• Partition identity mgmt. Enforcement
• Eliminates dormant and orphan accounts • Ensures regulatory compliance
• Facilitates auditing and accountability Competitive • Protects corporate info
• Enables delegated and self-service advantage • Safeguards intellectual property
account admin.
t d i • Supports internal audits
• Assures stronger authorisation based on
info value/sensitivity
Competitive Advantage • Enables risk and liability mgmt
• Improves corp. image and employee
relationships
• Yields flexible IdM infrastructure
• Facilitates mergers/divestments
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 16
17. Identity Management
WHY – Rationale, Drivers and Benefits
The Challenge
g
Today’s identity management systems are ad hocracies, built one application or
system at a time
Apps, databases, OSes lack a scalable, holistic means of managing identity,
credentials, policy across boundaries
,p y
Fragmented identity infrastructure: Overlapping repositories, inconsistent
policy frameworks, process discontinuities
Error prone, creates security loopholes, expensive to manage
The disappearing perimeter has put identity on the front burner
Infrastructure requirements: extend reach and range
Increased scalability, lower costs
Balance of centralised and distributed management
Infrastructure must be delivered as a Service (Identity Service) and re-usable
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 17
18. Identity Management
WHY – Rationale, Drivers and Benefits
Risks
Reduced risk of improper use of IT systems
Reduce risk of privacy or other regulatory violations
Substantial administration cost savings by reducing redundant
security administration
Accelerated time to market for new Products and Services to
Customers (Targeted Audience) , reduced deployment costs
Reduced cost of internal and external auditing
Better
B tt customer experience and increased retention
t i di d t ti
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 18
19. Identity Management
HOW – IdM Services Architecture
Objectives
j
Define the role of identity management in the context of business requirements
Develop an IdM Framework and guidelines
Implement re-usable Identity services
Develop and Implement company-wide role management
company wide
Document and streamline current and new identity related business processes
To provide a single view of Employee, Contractor, Customer and Business Partner
identity and entitlement
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 19
20. Identity Management
HOW – IdM S i
Services A hit t
Architecture
IdM Business Drivers IdM Benefits IdM Services
Improves user Identity and policy
Cost containment Administration
experience (Quality of
Experience [QoE])
Provides cost Directory services
y
Operational
O i l
efficiency savings
Access
Supports policy management
Business need
enforcement
Remote access
Regulatory Adds to competitive
advantage Federation
compliance
Provides lifecycle Provisioning
Risk management
identity
administration Portals/
Self-service
One of the key tasks to understand is how to map the executive’s business drivers into the benefits of IdM services-and then to map them into
technologies selected for deployment. As illustrated here, there are a lot of overlaps and disconnects that make the mapping difficult though not
deployment here difficult,
impossible.
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 20
21. Identity Management
HOW – IdM Services Architecture
Conceptual Architecture: Provisioning
p g
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 21
22. Identity Management
HOW – IdM S i
Services A hit t
Architecture
Conceptual Architecture: Access Management
p g
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 22
23. Identity Management
HOW – IdM S i
Services A hit t
Architecture
7 of Top 10 Control Deficiencies focus on Secure Identity Management
1. Operating System (e.g. Unix) access controls supporting financial applications or Portal
not secure
2.
2 Database (e.g. Oracle) access controls supporting financial applications (e.g. SAP
(e g (e g SAP,
Oracle, Peoplesoft, JDE) not secure
3. Development staff can run business transactions in production
4. Large number of users with access to “super user" transactions in production
g p p
5. Terminated employees or departed consultants still have access
6. Posting periods not restricted within GL application
7. Custom programs, tables & interfaces are not secured
8. Unidentified or unresolved segregation of duties issues
9. Procedures for manual processes do not exist or are not followed
10. System documentation does not match actual process
Source: Ken Vander Wal, Partner, National Quality Leader, E&YISACA Sarbanes Conference, 4/6/04
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 23
24. Identity Management
HOW – IdM Services Architecture
Compliancy
What is SOX (Sarbanes Oxley) Compliancy?
Companies must regularly provide external auditors with proof of their compliance
with laws and regulations. An example is the Sarbanes-Oxley (SOX) law, which applies to
listed American companies and, generally, to non-US companies listed on a US Stock
Exchange.
h
These laws and regulations may aim at preserving the integrity of financial data (case
of SOX and the French Law on Financial Security).
Generally,
Generally compliance requires identifying risks defining control objectives in order to
risks,
tackle them, and deciding on control activities to attain these objectives. Finally, in view
of these activities, it is necessary to prepare adequate tests to ensure that these
processes exist, are applied and working effectively.
These tests have two objectives. On the one hand, they are used to constantly improve
the processes and to provide information to the management and external auditors. On
the other hand, these tests will be used as evidence during certification to convince
external auditors about the organisation’s compliance with laws and regulations.
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 24
25. Identity Management
HOW – IdM Services Architecture
Compliancy
Why SOX (Sarbanes Oxley) Compliancy?
In some organisations, a large part of the risk of non-conformity to those regulations
is due to inadequate identity and access management. In fact, beyond the problem of
identity theft, actions made possible by wrongly assigned rights are a major source of
security breaches
Therefore, an Identity and Access Management (IAM) solution can be significant help
in the effort to comply with these laws and regulations. Moreover, such a solution can be
t ee o t co p y t t ese a s a d egu at o s o eo e , suc so ut o ca
used to simply upgrade a set of existing control procedures so as to simplify or adapt to
organisational changes
In addition to the functions it brings in, identity and access management must show
evidence of its effectiveness. This evidence must be made available in writing and on
demand to an auditor, for review and archiving
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 25
26. Identity Management
HOW – IdM Services Architecture
Compliancy SOX Reference Framework
Section 404 of SOX does not specify which set of formal evaluation categories, known as
“framework”, must be used in the assessment of controls over financial reporting.
Specific IT control frameworks may be chosen by a company, as long as the company
can convince its external auditor that its controls satisfy the requirements for effectiveness.
A framework of IT control objectives that is often used in the context of SOX is the
Control Objectives for information and related Technology – COBIT, issued by the IT
Governance institute – ITGI (www.itgi.org ).
SOX created the Public Company Accounting Oversight Board (PCAOB), a non-profit
organisation,
organisation to oversee auditors of public companies The PCAOB is charged with issuing
companies.
guidelines for auditors ion how to audit different aspects of reports, including the ones
related to section 404.
As long as the resulting controls satisfy the requirements set forth by the PCAOB’s
auditing standard, companies can conceivably use IT control frameworks other than COBIT.
Such frameworks can be the ones included in the IT Infrastructure Library – ITIL
(www.itil.co.uk ) or ISO17799. Companies may also choose a proprietary control
framework developed by consulting and audit firms.
It is important that companies work closely with their external auditors, especially in the
first rounds of SOX section 404 implementation and certification
certification.
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 26
27. Identity Management
HOW – IdM Services Architecture
Compliancy
ITIL Framework
You can only maintain the ITIL Framework, once you have completed Identity
Services Foundation to enable compliant ITIL operations support and Services
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 27
28. Identity Management
HOW – IdM Services Architecture
Programme of Work – Identity service
1) Agree on IdM Service strategy
2) Agree on Programme/Timeframe
3) Agree on First 12 months projects
Project 1: Service Foundation – Reconciliation Process: 1 to 4 Months
A.
A Understanding the problem reconciliation of the main applications in relation to Employee Contractors
problem, Employee,
B. Understanding the problem, reconciliation of our main Customer/Business partner applications (in light
of a drive to a single view of Customer)
This will identify the accounts related to business Users, which in turn can be used once completed as input
to Project 5
Project 2: Provisioning – Phase 1: 2 to 8 Months
Project 3: Access Management – Phase 1: 3 to 9 Months
Project 4: Active Directory clean-up / Re-design of AD 1 to 6 Months
Project 5: Profile-Based System Access:
Profile Based 6 to 9 Months
Inception / Validate Approach
Profile Discovery / HR Business Role Alignment
Profile Lifecycle Management
Governance Framework Development & Technology Road mapping 9 to 18 Months
Note: Business Analyst need to be assigned to this project for defining the service elements from a business requirements
perspective (IdM based BA)
Date: May 18 BEA Pty Ltd - IdM : The What, Why and How? Page: 28