SlideShare a Scribd company logo
CDH


CDH   Identity Management



               April 21, 2010
CDH                    Quick Facts



About Us           Approach            Partnerships
• 20th Year        • Vendor Agnostic   •   Microsoft Gold
• Grand Rapids &   • Non-reseller      •   VMware Enterprise
  Royal Oak        • Professional      •   Cisco Premier
• 25 Staff           Services Only     •   Novell Platinum
                                       •   Citrix Silver
CDH                    Expertise
  Project Management     Infrastructure               P
                                                      I
                                                      C
                                                      A




  Collaboration          Access & Identity Management




                                                  3
CDH                     Overview

      • Specific focus on enterprise identity
        management
         – SMB session to be offered later
      • Discussion about what identity
        management is and what it involves
      • Project Approach and Planning
      • Market Capabilities and Trends
      • Vendor Comparisons and Overviews
CDH    What is Identity Management?

      • User account creation, management, and
        cleanup
      • Attribute synchronization
      • Password synchronization
      • Password self-service
      • Delegated Management
      • Role Management
      • Single Sign On
      • Privileged User Management…..
CDH    What Identity Management Is Not

      • Not a replacement for application/system
        management tools (though it can minimize
        the need to use them)
      • Not a primary security enforcement tool
        (though it can help)
      • Not simple
      • Not cheap
      • Not able to solve world hunger
CDH                  Approaches

      • Rule based account sync
        – Very common first initiative
        – Actions based on established rules
      • Roles based provisioning
        – Role mining/analysis
        – Enterprise role modeling
      • Workflow system
        – Electronic forms and processes
        – Doesn’t require systems to be connected
CDH   Balanced Approach
CDH   Services Infrastructure
CDH              Initial Approach

      • Get management buy in
      • Analyze systems, applications, and
        processes across business units
      • Determine the pain points
      • Determine the points of greatest risk
      • Determine compliance requirements
      • Determine desired process improvements
      • Review current skill sets
CDH              Vendor Selection

      • Determine most suitable vendors
        – Previous analysis as basis
        – License agreements/Pricing
        – Granular yet scalable
      • Demo/POC environment
        – Get the vendors/partners (wink-wink) to help
        – Most can be completely virtual
CDH      Vendor Selection Continued

      • Exercise/test/play
        – Feed it samples of current data
        – Build representative roles
        – Involve other business units
           • Helpdesk, HR, others
           • Workflow interaction
           • Role management and assignment
CDH              Common Mistakes

      • Taking on too much at once
        – Important to take it slow at first
      • Failure to get upper management buy-in
        – Business processes will change
      • Scope creep
        – “Let’s add this one simple application”
      • Allowing requirements to go unchecked
        – Contributes to complexity and scope creep
      • Not taking the exceptions into account
CDH         More Common Mistakes

      • Not changing business processes
         – Too many implementations just automate bad
           processes
         – Use the opportunity to revise processes
      • Expectation of immediate ROI
         – Initially many processes may be duplicated for
           a time
      • Failure to establish full testing plans
         – Automated testing preferred
CDH        More Common Mistakes

      • Using the existing NOS directory as the
        central ID repository
        – AD/eDir is a file, print, and workstation
          management directory
        – It should be treated like all other connected
          apps/systems
      • Collapsing too much to a single directory
        – Allow apps to have their own directory
        – IDM allows easy management of separate
          directories
CDH


CDH   Market
CDH               Market Trends

      • User provisioning almost becoming a
        commodity – everyone does it
      • More emphasis is being placed on Roles
        and Governance, Risk, and Compliance
        (GRC) management
      • Data Leak Prevention (DLP) integration
        becoming more commonplace
      • Organizations tending to more look at IDM
        holistically
CDH                 Market Trends

      • Wizards, web GUIs, business process
        mapping tools, and “codeless” capabilities
        are reducing implementation times
        – Time to take a 2nd look
      • Greater integration with partnering
        technologies from other vendors
        – Role management products
        – SSO products
      • Many acquisitions changing the landscape
CDH                          Roles

      • Typically have multiple levels
        – Business roles
        – Permission roles
      • Entitlements/resources typically assigned
        to roles
      • Some can be 100% based on attribute
        values
      • Most should allow manual assignment with
        approvals
CDH                         GRC

      • What is it?
      • Governance
        – Establishing role and entitlement policies
      • Risk
        – Assigning risk factors to roles and entitlements
      • Compliance
        – Preventing unjustified access and proving it
CDH                GRC Example

      • Risk levels are assigned to roles and
        entitlements
      • Increased scrutiny and monitoring applied
        to higher risk roles and entitlements
      • The risk levels of the roles and
        entitlements assigned to a person add up
        to a threat level
      • Increased scrutiny and monitoring of the
        user result from the increased threat level
CDH


CDH   Vendor Comparisons
CDH   Vendor Grid
Enterprise Role Management
CDH        Market (Forrester)




       Forrester Enterprise Role Mgmt - Feb 09
Enterprise Role Management
CDH        Market (Forrester)




       Forrester Enterprise Role Mgmt - Feb 09
CDH   User Provisioning
CDH


CDH   Vendor Overviews
CDH                   Microsoft

      • New release – FIM
      • Still way behind in the market, FIM won’t
        significantly change this
      • Still may be an easy choice for MS shops
        with limited needs
      • Can be cheaper than other solutions, but
        not on an apples-to-apples comparison
      • MS has stated that they want to become a
        leader in the market – will take much work
CDH                      Sentillion

      • Acquired by Microsoft
        – Still trying to figure out how to best integrate
          the technologies
        – Some of the technologies directly compete
          with FIM – what’s going to win?
      • Healthcare focused
        – Almost exclusively
CDH                      Novell

      • Continues to fight the “bad” reputation of
        their name
      • No concern over Novell’s viability
      • Extraordinary capabilities with limited
        coding requirements
      • Offers unparalleled platform flexibility
      • IDM 4 brings strong new capabilities to the
        mix – “game changers”
CDH                     Courion

      • A strong suite of powerful products
      • Focused specifically in identity
        management technologies
      • One of the earliest to offer SharePoint
        integration & management
      • Establishes partnerships and provides
        tight integration
      • Excellent rogue account management
CDH                  Oracle/Sun

      • Much FUD about what the merger actually
        means, not all is undeserved
      • Some integration has already occurred
        – Sun products being rename to Oracle xx
      • Highly capable solutions
      • Deep development requirements
        – Do you have dedicate Java developers?
        – You’ll need more
CDH                       IBM

      • Shares top tier rating
      • Part of the Tivoli suite of products
      • XPRESS for simpler implementation
        – XML based
      • Like Oracle/Sun, requires pretty deep
        development for more complex
        functionality
      • Aggressive product pricing in IBM shops
CDH                        CA

      • Recently acquired Eurekify, an excellent
        role mining and management vendor
      • Uses Policy Xpress (sound familiar?) to
        simplify policy “development”
      • GUI workflow designer tool
      • Also fights a bad rep at times
      • Tends to ignore smaller engagements
CDH               Other Vendors

      • Too many to list!
      • A number build on Microsoft solution
      • Some show much promise
        – EmpowerID from The Dot Net Factory
CDH


CDH   Solution Similarities
CDH                   Commonalities

      • Centralized identity repository
        –   Identity Vault
        –   Metaverse
        –   ID Store
        –   LDAP
      • XML
        – Config and settings files
        – Transaction documents
        – Rules and policies
CDH              Common Claims

      • Agent-less
        – Usually means limited (AD API vs LDAP)
        – MUST have an agent (client or server) for
          password sync from an app/system
      • GUI Builders and Wizards
        – Meant to simplify development
        – Provide for basic functionality
        – Sometimes don’t go far enough (how do you
          extend?)
CDH


CDH   C/D/H IDM Perspective
CDH              C/D/H Experience

      • We help determine what IDM solution set
        and vendor is best based on the
        organization
        – Sync, SSO, reporting, monitoring
        – Existing relationships, budget, scope, skills
      • Clients from 250 to 250,000 users
      • Medium-large focus
        – Most clients in the 3,000-8,000 user range
CDH             C/D/H Experience

      • Few in-house developers
        – Well established developer relationships
          utilized when needed
        – Focus more on business process planning
      • We like solutions requiring minimal
        development
        – Microsoft
        – Novell
        – Courion
CDH   C/D/H Experience
CDH   C/D/H Experience
CDH                         Thank You

 Royal Oak                                  Grand Rapids
 306 S. Washington Ave.                     15 Ionia SW
 Suite 212                                  Suite 270
 Royal Oak, MI 48067                        Grand Rapids, MI 49503
 p: (248) 546-1800                          p: (616) 776-1600




                 www.cdh.com
                   (c) C/D/H 2007. All rights reserved

More Related Content

What's hot

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
CA API Management
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
Alain Huet
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
Bibhuti Kr Jha +91-9810016292
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
Horst Walther
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
hankgruenberg
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Enterprise Management Associates
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
IBM Sverige
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
SecureAuth
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
Josep Bardallo
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s Next
ENow Software
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
pmcbrideva1
 

What's hot (20)

IdM FinalVer
IdM FinalVerIdM FinalVer
IdM FinalVer
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s Next
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 

Viewers also liked

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
SAP Technology
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentation
lgoess
 
Identity Management Manifesto
Identity Management ManifestoIdentity Management Manifesto
Identity Management Manifesto
Trendbüro
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
CheapSSLsecurity
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
NetwayClub
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CloudIDSummit
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentationSaiful Chowdhury
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
 
Object recognition
Object recognitionObject recognition
Object recognition
saniacorreya
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
Sofie van der Meulen
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
Andrew Ames
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
Smart Grid Interoperability Panel
 
Object recognition
Object recognitionObject recognition
Object recognitionakkichester
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts WSO2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity ManagementFraunhofer AISEC
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
CloudIDSummit
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trinings
 

Viewers also liked (18)

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentation
 
Identity Management Manifesto
Identity Management ManifestoIdentity Management Manifesto
Identity Management Manifesto
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 

Similar to Identity Management: What Solution is Right for You?

Salesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social EnterpriseSalesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social Enterprise
James Hindes
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
Bluewolf
 
B2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWSB2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWS
Amazon Web Services
 
How to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionHow to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selection
John Cachat
 
Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
Datavail
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
ScriptLogic
 
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 Moving Oracle Applications to the Cloud - Which Cloud is Right for Me? Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Datavail
 
Patching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP CloudPatching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP Cloud
Datavail
 
Continuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIXContinuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIX
AgileSparks
 
Mind Chips Consulting Offerings
Mind Chips Consulting   OfferingsMind Chips Consulting   Offerings
Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...
Perforce
 
Patterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsPatterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps Tools
Strongback Consulting
 
SEC Presentation V2
SEC Presentation V2SEC Presentation V2
SEC Presentation V2
Salim Sheikh
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld
 
Journey to the Cloud: What I Wish I Knew Before I Started
 Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
Datavail
 
The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012
Coupa Software
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
Flexera
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
Jesse Stockall
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
Spm lecture-5
Spm lecture-5Spm lecture-5
Spm lecture-5
Sulman Ahmed
 

Similar to Identity Management: What Solution is Right for You? (20)

Salesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social EnterpriseSalesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social Enterprise
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
 
B2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWSB2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWS
 
How to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionHow to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selection
 
Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
 
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 Moving Oracle Applications to the Cloud - Which Cloud is Right for Me? Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 
Patching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP CloudPatching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP Cloud
 
Continuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIXContinuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIX
 
Mind Chips Consulting Offerings
Mind Chips Consulting   OfferingsMind Chips Consulting   Offerings
Mind Chips Consulting Offerings
 
Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...
 
Patterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsPatterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps Tools
 
SEC Presentation V2
SEC Presentation V2SEC Presentation V2
SEC Presentation V2
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
Journey to the Cloud: What I Wish I Knew Before I Started
 Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
 
The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Spm lecture-5
Spm lecture-5Spm lecture-5
Spm lecture-5
 

More from C/D/H Technology Consultants

6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
C/D/H Technology Consultants
 
No Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 MigrationNo Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 Migration
C/D/H Technology Consultants
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
C/D/H Technology Consultants
 
Google for education vs office 365
Google for education vs office 365Google for education vs office 365
Google for education vs office 365
C/D/H Technology Consultants
 
C/D/H 1990-2015
C/D/H 1990-2015C/D/H 1990-2015
SharePoint for Government
SharePoint for GovernmentSharePoint for Government
SharePoint for Government
C/D/H Technology Consultants
 
Lean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft AzureLean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft Azure
C/D/H Technology Consultants
 
SharePoint site admins leverage search
SharePoint site admins leverage searchSharePoint site admins leverage search
SharePoint site admins leverage search
C/D/H Technology Consultants
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
C/D/H Technology Consultants
 
Microsoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentationMicrosoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentation
C/D/H Technology Consultants
 
Have It Your Way! SharePoint Customizations
Have It Your Way! SharePoint CustomizationsHave It Your Way! SharePoint Customizations
Have It Your Way! SharePoint Customizations
C/D/H Technology Consultants
 
Office 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the CloudOffice 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the Cloud
C/D/H Technology Consultants
 

More from C/D/H Technology Consultants (20)

6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
No Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 MigrationNo Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 Migration
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Google for education vs office 365
Google for education vs office 365Google for education vs office 365
Google for education vs office 365
 
C/D/H 1990-2015
C/D/H 1990-2015C/D/H 1990-2015
C/D/H 1990-2015
 
SharePoint for Government
SharePoint for GovernmentSharePoint for Government
SharePoint for Government
 
Lean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft AzureLean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft Azure
 
SharePoint site admins leverage search
SharePoint site admins leverage searchSharePoint site admins leverage search
SharePoint site admins leverage search
 
Real world records management in SharePoint 2013
Real world records management in SharePoint 2013Real world records management in SharePoint 2013
Real world records management in SharePoint 2013
 
Real world records management in share point 2013
Real world records management in share point 2013Real world records management in share point 2013
Real world records management in share point 2013
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Microsoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentationMicrosoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentation
 
Office 365 branding webinar
Office 365 branding webinarOffice 365 branding webinar
Office 365 branding webinar
 
Have It Your Way! SharePoint Customizations
Have It Your Way! SharePoint CustomizationsHave It Your Way! SharePoint Customizations
Have It Your Way! SharePoint Customizations
 
C/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy StepsC/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy Steps
 
Real world rm in share point 2013
Real world rm in share point 2013Real world rm in share point 2013
Real world rm in share point 2013
 
Lync seminar preso all content
Lync seminar preso all contentLync seminar preso all content
Lync seminar preso all content
 
Office 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the CloudOffice 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the Cloud
 
Epm seminar presentation
Epm seminar presentationEpm seminar presentation
Epm seminar presentation
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Identity Management: What Solution is Right for You?

  • 1. CDH CDH Identity Management April 21, 2010
  • 2. CDH Quick Facts About Us Approach Partnerships • 20th Year • Vendor Agnostic • Microsoft Gold • Grand Rapids & • Non-reseller • VMware Enterprise Royal Oak • Professional • Cisco Premier • 25 Staff Services Only • Novell Platinum • Citrix Silver
  • 3. CDH Expertise Project Management Infrastructure P I C A Collaboration Access & Identity Management 3
  • 4. CDH Overview • Specific focus on enterprise identity management – SMB session to be offered later • Discussion about what identity management is and what it involves • Project Approach and Planning • Market Capabilities and Trends • Vendor Comparisons and Overviews
  • 5. CDH What is Identity Management? • User account creation, management, and cleanup • Attribute synchronization • Password synchronization • Password self-service • Delegated Management • Role Management • Single Sign On • Privileged User Management…..
  • 6. CDH What Identity Management Is Not • Not a replacement for application/system management tools (though it can minimize the need to use them) • Not a primary security enforcement tool (though it can help) • Not simple • Not cheap • Not able to solve world hunger
  • 7. CDH Approaches • Rule based account sync – Very common first initiative – Actions based on established rules • Roles based provisioning – Role mining/analysis – Enterprise role modeling • Workflow system – Electronic forms and processes – Doesn’t require systems to be connected
  • 8. CDH Balanced Approach
  • 9. CDH Services Infrastructure
  • 10. CDH Initial Approach • Get management buy in • Analyze systems, applications, and processes across business units • Determine the pain points • Determine the points of greatest risk • Determine compliance requirements • Determine desired process improvements • Review current skill sets
  • 11. CDH Vendor Selection • Determine most suitable vendors – Previous analysis as basis – License agreements/Pricing – Granular yet scalable • Demo/POC environment – Get the vendors/partners (wink-wink) to help – Most can be completely virtual
  • 12. CDH Vendor Selection Continued • Exercise/test/play – Feed it samples of current data – Build representative roles – Involve other business units • Helpdesk, HR, others • Workflow interaction • Role management and assignment
  • 13. CDH Common Mistakes • Taking on too much at once – Important to take it slow at first • Failure to get upper management buy-in – Business processes will change • Scope creep – “Let’s add this one simple application” • Allowing requirements to go unchecked – Contributes to complexity and scope creep • Not taking the exceptions into account
  • 14. CDH More Common Mistakes • Not changing business processes – Too many implementations just automate bad processes – Use the opportunity to revise processes • Expectation of immediate ROI – Initially many processes may be duplicated for a time • Failure to establish full testing plans – Automated testing preferred
  • 15. CDH More Common Mistakes • Using the existing NOS directory as the central ID repository – AD/eDir is a file, print, and workstation management directory – It should be treated like all other connected apps/systems • Collapsing too much to a single directory – Allow apps to have their own directory – IDM allows easy management of separate directories
  • 16. CDH CDH Market
  • 17. CDH Market Trends • User provisioning almost becoming a commodity – everyone does it • More emphasis is being placed on Roles and Governance, Risk, and Compliance (GRC) management • Data Leak Prevention (DLP) integration becoming more commonplace • Organizations tending to more look at IDM holistically
  • 18. CDH Market Trends • Wizards, web GUIs, business process mapping tools, and “codeless” capabilities are reducing implementation times – Time to take a 2nd look • Greater integration with partnering technologies from other vendors – Role management products – SSO products • Many acquisitions changing the landscape
  • 19. CDH Roles • Typically have multiple levels – Business roles – Permission roles • Entitlements/resources typically assigned to roles • Some can be 100% based on attribute values • Most should allow manual assignment with approvals
  • 20. CDH GRC • What is it? • Governance – Establishing role and entitlement policies • Risk – Assigning risk factors to roles and entitlements • Compliance – Preventing unjustified access and proving it
  • 21. CDH GRC Example • Risk levels are assigned to roles and entitlements • Increased scrutiny and monitoring applied to higher risk roles and entitlements • The risk levels of the roles and entitlements assigned to a person add up to a threat level • Increased scrutiny and monitoring of the user result from the increased threat level
  • 22. CDH CDH Vendor Comparisons
  • 23. CDH Vendor Grid
  • 24. Enterprise Role Management CDH Market (Forrester) Forrester Enterprise Role Mgmt - Feb 09
  • 25. Enterprise Role Management CDH Market (Forrester) Forrester Enterprise Role Mgmt - Feb 09
  • 26. CDH User Provisioning
  • 27. CDH CDH Vendor Overviews
  • 28. CDH Microsoft • New release – FIM • Still way behind in the market, FIM won’t significantly change this • Still may be an easy choice for MS shops with limited needs • Can be cheaper than other solutions, but not on an apples-to-apples comparison • MS has stated that they want to become a leader in the market – will take much work
  • 29. CDH Sentillion • Acquired by Microsoft – Still trying to figure out how to best integrate the technologies – Some of the technologies directly compete with FIM – what’s going to win? • Healthcare focused – Almost exclusively
  • 30. CDH Novell • Continues to fight the “bad” reputation of their name • No concern over Novell’s viability • Extraordinary capabilities with limited coding requirements • Offers unparalleled platform flexibility • IDM 4 brings strong new capabilities to the mix – “game changers”
  • 31. CDH Courion • A strong suite of powerful products • Focused specifically in identity management technologies • One of the earliest to offer SharePoint integration & management • Establishes partnerships and provides tight integration • Excellent rogue account management
  • 32. CDH Oracle/Sun • Much FUD about what the merger actually means, not all is undeserved • Some integration has already occurred – Sun products being rename to Oracle xx • Highly capable solutions • Deep development requirements – Do you have dedicate Java developers? – You’ll need more
  • 33. CDH IBM • Shares top tier rating • Part of the Tivoli suite of products • XPRESS for simpler implementation – XML based • Like Oracle/Sun, requires pretty deep development for more complex functionality • Aggressive product pricing in IBM shops
  • 34. CDH CA • Recently acquired Eurekify, an excellent role mining and management vendor • Uses Policy Xpress (sound familiar?) to simplify policy “development” • GUI workflow designer tool • Also fights a bad rep at times • Tends to ignore smaller engagements
  • 35. CDH Other Vendors • Too many to list! • A number build on Microsoft solution • Some show much promise – EmpowerID from The Dot Net Factory
  • 36. CDH CDH Solution Similarities
  • 37. CDH Commonalities • Centralized identity repository – Identity Vault – Metaverse – ID Store – LDAP • XML – Config and settings files – Transaction documents – Rules and policies
  • 38. CDH Common Claims • Agent-less – Usually means limited (AD API vs LDAP) – MUST have an agent (client or server) for password sync from an app/system • GUI Builders and Wizards – Meant to simplify development – Provide for basic functionality – Sometimes don’t go far enough (how do you extend?)
  • 39. CDH CDH C/D/H IDM Perspective
  • 40. CDH C/D/H Experience • We help determine what IDM solution set and vendor is best based on the organization – Sync, SSO, reporting, monitoring – Existing relationships, budget, scope, skills • Clients from 250 to 250,000 users • Medium-large focus – Most clients in the 3,000-8,000 user range
  • 41. CDH C/D/H Experience • Few in-house developers – Well established developer relationships utilized when needed – Focus more on business process planning • We like solutions requiring minimal development – Microsoft – Novell – Courion
  • 42. CDH C/D/H Experience
  • 43. CDH C/D/H Experience
  • 44. CDH Thank You Royal Oak Grand Rapids 306 S. Washington Ave. 15 Ionia SW Suite 212 Suite 270 Royal Oak, MI 48067 Grand Rapids, MI 49503 p: (248) 546-1800 p: (616) 776-1600 www.cdh.com (c) C/D/H 2007. All rights reserved