SlideShare a Scribd company logo
Access Management
Automated Compliance
www.iddriven.com
2
What is IDdriven
• Software as a Service (SaaS)
• Access Management and Automated Compliance
• Monthly service ($2 per user, $1000 minimum per month)
• Companies using Microsoft Office 365 & Active Directory
• Solves Identity Access Management (IAM)
• Solves compliance issues - certifying access (attestation).
Apr-17 2
www.iddriven.com
3
IDdriven + Office 365 + Active Directory
• Microsoft provides:
• Authentication
• Federation
• IDdriven provides:
• Authorization management
• User/account management
• Audit and logging
• Policy enforcement
Apr-17 3
Authorization
management
Policy
enforcement
Federation
Audit and
logging
User/account
management
Authentication
Identity Access Management (IAM) functions and processes
X Provided by Microsoft
COMPLETE SOLUTION !!
www.iddriven.com
4
IDdriven features
4
Access Management Account Management License Management
Risk Management Attestation or review Policy Management
Self-service
Report and Alert
5
Added value for customers
• Control and automation of joiners, movers and leavers
• Automation of compliance processes
• Self service for users to request additional access rights
• Improved protection against cyber crime
• Risk management for application access rights
• Insight, easy reporting and graphical overviews
• Management of licenses for (cloud) applications
Apr-17 5
6
Added value for customers (details)
• Control and automation of joiners, movers and leavers
• New users will automatically get an account, access and licenses to the
applications
• Users which change position will automatically get their access
updated
• Users which leave the organization will automatically lose accounts,
licenses and their access to application.
Apr-17 6
Access Management Account Management
7
Added value for customers (details)
• Automation of compliance processes
• Preventive policy enforcement (like Segregation of Duties)
• Automated Attestation or Access review
• Cleaning of ghost accounts and proliferated access assignments
• Historical view and decision review
Apr-17 7
Attestation or review Policy Management Report and Alert
8
Added value for customers (details)
• Self service for users to request additional access rights
• End-user ability to request additional access
• End-user ability to request licenses or devices
• Approval workflow
• Delegated access management
• Temporary access
Apr-17 8
Self-service Report and Alert
9
Added value for customers (details)
• Improved protection against cyber crime
• Zone Based Access Controls prevents users from approaching
applications from outside trusted area’s
• Providing users with least privileges prevents damage in case of
breaches
• Approval workflow
• Risk analysis
Apr-17 9
Zone Based Access Control
10
Added value for customers (details)
• Risk management for application access rights
• Risk classification for application access rights
• Lowers the risk by providing users least privileges
• Access reviews that eliminate risk caused by old accounts
• Users leaving organization will lose their access automatically and in-time
• Policies and policy over-write will provide a controlled way to manage and
control risks
Apr-17 10
Risk Management Attestation or review Policy Management
11
Added value for customers (details)
• Insight, easy reporting and graphical overviews
• Easy access to reports
• Graphical overview of access assignment
• Real time monitoring of Attestation/Access review progress
• Impact analysis on changes
• Reports for every type of user, from IT manager to Security officr or
compliance manager
Apr-17 11
Attestation or reviewReport and Alert
12
Added value for customers (details)
• Management of licenses for (cloud) applications
• Guarantee that users have the correct licenses assigned
• User joins -> license assigned | User leaves -> license revoked and available for
someone else
• One service to control all license assignments
• In-time revocation of unused licenses
• Saving cost by having the correct license assigned and/or revoked from leavers
• Notification when running out of licenses
Apr-17 12
License Management

More Related Content

What's hot

iTRADE presentation 12 May, 2010
iTRADE presentation 12 May, 2010iTRADE presentation 12 May, 2010
iTRADE presentation 12 May, 2010
guest72edb4
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
Vandana Verma
 
McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process Redesign
Bhavik Doshi
 
SIM332
SIM332SIM332
SIM332
Nojan Emad
 
Monitor solution overview Webinar March 2015
Monitor solution overview   Webinar March 2015Monitor solution overview   Webinar March 2015
Monitor solution overview Webinar March 2015
MonitorIT Ltd
 
Infosafe ah iam 2015
Infosafe ah iam 2015Infosafe ah iam 2015
Infosafe ah iam 2015
Alain Huet
 
Richter video screenshots may
Richter video screenshots mayRichter video screenshots may
Richter video screenshots may
razleesecurity
 
Practice Management System
Practice Management SystemPractice Management System
Practice Management System
Binary Spectrum
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
Atlas Systems
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 
Netmera - Multi-channel Customer Engagement Platform
Netmera - Multi-channel Customer Engagement PlatformNetmera - Multi-channel Customer Engagement Platform
Netmera - Multi-channel Customer Engagement Platform
Ahmet Başaran
 
Software Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service ManagementSoftware Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service Management
Strongstep - Innovation in software quality
 
Inomera API Management Platform
Inomera API Management PlatformInomera API Management Platform
Inomera API Management Platform
Ahmet Başaran
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
Maintec Technologies Pvt Ltd
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Ebusiness gp1 ppt_submission
Ebusiness gp1 ppt_submissionEbusiness gp1 ppt_submission
Ebusiness gp1 ppt_submission
RadhakrishnanP21
 
Control, Compliance and Efficiency: Why We Implemented Payments in Kyriba
Control, Compliance and Efficiency: Why We Implemented Payments in KyribaControl, Compliance and Efficiency: Why We Implemented Payments in Kyriba
Control, Compliance and Efficiency: Why We Implemented Payments in Kyriba
Kyriba Corporation
 
CyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzoneCyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzone
ITJobZone.biz
 

What's hot (18)

iTRADE presentation 12 May, 2010
iTRADE presentation 12 May, 2010iTRADE presentation 12 May, 2010
iTRADE presentation 12 May, 2010
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process Redesign
 
SIM332
SIM332SIM332
SIM332
 
Monitor solution overview Webinar March 2015
Monitor solution overview   Webinar March 2015Monitor solution overview   Webinar March 2015
Monitor solution overview Webinar March 2015
 
Infosafe ah iam 2015
Infosafe ah iam 2015Infosafe ah iam 2015
Infosafe ah iam 2015
 
Richter video screenshots may
Richter video screenshots mayRichter video screenshots may
Richter video screenshots may
 
Practice Management System
Practice Management SystemPractice Management System
Practice Management System
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Netmera - Multi-channel Customer Engagement Platform
Netmera - Multi-channel Customer Engagement PlatformNetmera - Multi-channel Customer Engagement Platform
Netmera - Multi-channel Customer Engagement Platform
 
Software Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service ManagementSoftware Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service Management
 
Inomera API Management Platform
Inomera API Management PlatformInomera API Management Platform
Inomera API Management Platform
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Ebusiness gp1 ppt_submission
Ebusiness gp1 ppt_submissionEbusiness gp1 ppt_submission
Ebusiness gp1 ppt_submission
 
Control, Compliance and Efficiency: Why We Implemented Payments in Kyriba
Control, Compliance and Efficiency: Why We Implemented Payments in KyribaControl, Compliance and Efficiency: Why We Implemented Payments in Kyriba
Control, Compliance and Efficiency: Why We Implemented Payments in Kyriba
 
CyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzoneCyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzone
 

Similar to Identity Management and Access Governance (IDaaS)

DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
FinTech Belgium
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
ForgeRock
 
Co p
Co pCo p
Co p
Co pCo p
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
Ahmadi Madi
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Software India
 
Information Assurance for Accountant 2007
Information Assurance for Accountant 2007Information Assurance for Accountant 2007
Information Assurance for Accountant 2007
Donald E. Hester
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
ITJobZone.biz
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
Solarwinds N-able
 
Bigiota Company Profile
Bigiota Company ProfileBigiota Company Profile
Bigiota Company Profile
Krishna Kumar Maurya
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
Anand Dhouni
 
servicedesk-plus-overview
servicedesk-plus-overviewservicedesk-plus-overview
servicedesk-plus-overview
Mohammad Sadegh Khatibpour
 
ServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview PresentationServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview Presentation
ServiceDesk Plus
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
Precisely
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
Happiest Minds Technologies
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
BlackBerry
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Student Debt Solutions
Student Debt SolutionsStudent Debt Solutions
Student Debt Solutions
Todd Meyers
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
Fanky Christian
 

Similar to Identity Management and Access Governance (IDaaS) (20)

DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Information Assurance for Accountant 2007
Information Assurance for Accountant 2007Information Assurance for Accountant 2007
Information Assurance for Accountant 2007
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
Bigiota Company Profile
Bigiota Company ProfileBigiota Company Profile
Bigiota Company Profile
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
servicedesk-plus-overview
servicedesk-plus-overviewservicedesk-plus-overview
servicedesk-plus-overview
 
ServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview PresentationServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview Presentation
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Student Debt Solutions
Student Debt SolutionsStudent Debt Solutions
Student Debt Solutions
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Identity Management and Access Governance (IDaaS)

  • 2. 2 What is IDdriven • Software as a Service (SaaS) • Access Management and Automated Compliance • Monthly service ($2 per user, $1000 minimum per month) • Companies using Microsoft Office 365 & Active Directory • Solves Identity Access Management (IAM) • Solves compliance issues - certifying access (attestation). Apr-17 2 www.iddriven.com
  • 3. 3 IDdriven + Office 365 + Active Directory • Microsoft provides: • Authentication • Federation • IDdriven provides: • Authorization management • User/account management • Audit and logging • Policy enforcement Apr-17 3 Authorization management Policy enforcement Federation Audit and logging User/account management Authentication Identity Access Management (IAM) functions and processes X Provided by Microsoft COMPLETE SOLUTION !! www.iddriven.com
  • 4. 4 IDdriven features 4 Access Management Account Management License Management Risk Management Attestation or review Policy Management Self-service Report and Alert
  • 5. 5 Added value for customers • Control and automation of joiners, movers and leavers • Automation of compliance processes • Self service for users to request additional access rights • Improved protection against cyber crime • Risk management for application access rights • Insight, easy reporting and graphical overviews • Management of licenses for (cloud) applications Apr-17 5
  • 6. 6 Added value for customers (details) • Control and automation of joiners, movers and leavers • New users will automatically get an account, access and licenses to the applications • Users which change position will automatically get their access updated • Users which leave the organization will automatically lose accounts, licenses and their access to application. Apr-17 6 Access Management Account Management
  • 7. 7 Added value for customers (details) • Automation of compliance processes • Preventive policy enforcement (like Segregation of Duties) • Automated Attestation or Access review • Cleaning of ghost accounts and proliferated access assignments • Historical view and decision review Apr-17 7 Attestation or review Policy Management Report and Alert
  • 8. 8 Added value for customers (details) • Self service for users to request additional access rights • End-user ability to request additional access • End-user ability to request licenses or devices • Approval workflow • Delegated access management • Temporary access Apr-17 8 Self-service Report and Alert
  • 9. 9 Added value for customers (details) • Improved protection against cyber crime • Zone Based Access Controls prevents users from approaching applications from outside trusted area’s • Providing users with least privileges prevents damage in case of breaches • Approval workflow • Risk analysis Apr-17 9 Zone Based Access Control
  • 10. 10 Added value for customers (details) • Risk management for application access rights • Risk classification for application access rights • Lowers the risk by providing users least privileges • Access reviews that eliminate risk caused by old accounts • Users leaving organization will lose their access automatically and in-time • Policies and policy over-write will provide a controlled way to manage and control risks Apr-17 10 Risk Management Attestation or review Policy Management
  • 11. 11 Added value for customers (details) • Insight, easy reporting and graphical overviews • Easy access to reports • Graphical overview of access assignment • Real time monitoring of Attestation/Access review progress • Impact analysis on changes • Reports for every type of user, from IT manager to Security officr or compliance manager Apr-17 11 Attestation or reviewReport and Alert
  • 12. 12 Added value for customers (details) • Management of licenses for (cloud) applications • Guarantee that users have the correct licenses assigned • User joins -> license assigned | User leaves -> license revoked and available for someone else • One service to control all license assignments • In-time revocation of unused licenses • Saving cost by having the correct license assigned and/or revoked from leavers • Notification when running out of licenses Apr-17 12 License Management