SlideShare a Scribd company logo
SUCCESS STORY




                                            A2A Boosts Security Compliance
                                            With Identity Manager


Executive Summary
Industry Description
Headquartered in in Milan and
Brescia and serving the whole region
of Lombardia, A2A specializes in
the production, distribution and
sale of electric energy, gas and
district heating. It is one of Italy’s
leading multi-utility groups.

Business Situation
A2A wanted a trusted and
comprehensive solution that could
help provide full and continuous
control over its internal users’            Italian multi-utility group A2A specializes   The NetIQ Solution
access to any application.                  in the production, distribution and
                                            sale of electric energy and gas, and          Following a competitive tender, A2A
The NetIQ Difference
                                            the distribution and sale of district         decided to implement Identity Manager.
Identity Manager has provided A2A with
the reliability and flexibility needed to   heating. It provides its services to the
manage the access rights of all 6,000 of    entire region of Lombardia, and is            “Identity Manager had all the features
its users. The company can now comply       currently one of Italy’s leading multi-       we were looking for: flexibility, reliability,
more easily with national regulations       utility corporations, with future plans       ease of configuration and use, and great
around the security and protection of       for international business growth.            value for [the] money,” Cuscito said.
confidential data.
                                            A2A must comply with a series of              Working with Deloitte, A2A implemented
NetIQ Products and Services
                                            national regulations and policies that        Identity Manager in two phases. The
Identity Manager
                                            establish the correct management of           first was finalized in nine months. A2A
                                            identities and mitigation of business         is currently undergoing phase two of
                                            risk. Gianfranco Cuscito, ICT manager         the implementation and is confident
                                            of A2A, said, “We perceived pressure          that it will be able to complete this
                                            on us because we lacked an automated          phase within its 12-month time frame.
                                            and reliable tool to manage our users
                                            and detect any incorrect or suspect           Identity Manager has enabled A2A
                                            action performed on our systems.”             to create a standard set of rights
                                                                                          and authorizations for regular users,
                                            As Cuscito explained, “Managing our           and to use this set as a basis for
                                            6,000 users’ authorisation profiles across    subsequent changes, additions or
                                            multiple non-integrated applications          removals of privileges. “The system
                                            and in some cases manually would not          immediately recognizes who accesses
                                            have been feasible, in that it would          an application, what their rights are
                                            have taken at least five days per person.     and which applications they can
                                            We needed an automated solution               use,” said Cuscito. “In this way, we can
                                            for managing users’ authorisation             make sure that operational risks are
                                            profiles for critical applications.”          removed or controlled and that the
area manager agrees and updates the       Identity Manager has also
                                                                     user’s set of privileges accordingly,     revolutionized adding, removing or
     “The system immediately                                         the system will automatically take        editing a user’s set of rights. “In the
                                                                     in those changes and enable the           past, these processes were performed
     recognizes who is                                               person to continue their work.”           manually and on paper sheets, wasting
     authorized to access                                                                                      considerable amounts of time and
                                                                     Identity Manager covers all the           resources,” Cuscito said. “With Identity
     an application, what                                            company’s core applications, which        Manager all of this occurs automatically
     their rights are and                                            are largely based on SAP software, and    and in real time, allowing us to
                                                                     also will allow A2A to automatically      understand right from the beginning
     which applications                                              manage password synchronization.          what is happening on our network,
     they can use.”                                                                                            and if assigning a certain role to a
                                                                     Using Identity Manager, A2A               user is going to put us at risk or not.”
                           Gianfranco Cuscito,                       helps ensure Compliance with
                                                                                                               As A2A pursues its plans for
                              ICT Manager, A2A                       National Security Regulations             international growth, IT is already
                                                                     With Identity Manager, A2A can            planning to extend the successful
                                                                     manage all access to its numerous         solution to the whole group.
     national regulations in terms of                                applications, and also determine
     segregation of duty are respected.”                             whether a certain user is allowed to      Learn more today by contacting
                                                                     perform a specific task by accessing a    your NetIQ® partner or a local NetIQ
     With Identity Manager, A2A can                                  given application. “For instance,” said   sales representative, or by visiting
     provision new users quickly and                                 Cuscito, “if the same user performs       www.netiq.com for contact
     easily, and apply all updates to                                actions belonging to separate             information in your area.
     identity information in real time.                              areas—such as creating a purchase
                                                                     order, issuing an invoice and, finally,
     “When users need to access a                                    entering the payment received—the
     particular area that they are normally                          system will warn us so that we can
     not allowed to use, they can ask                                take action accordingly and in a timely
     the area manager for a specific                                 fashion, to avoid any possible risk.”
     authorization,” said Cuscito. “If the




Worldwide Headquarters                                For a complete list of our offices
1233 West Loop South, Suite 810                       in North America, Europe, the
Houston, Texas 77027 USA                              Middle East, Africa, Asia-Pacific
Worldwide: +1 713.548.1700                            and Latin America, please visit
U.S. / Canada Toll Free: 888.323.6768                 www.netiq.com/contacts.
info@netiq.com
www.netiq.com
http://community.netiq.com                            Follow us:



NetIQ and the NetIQ logo are registered trademarks of NetIQ Corporation in the USA.
All other company and product names may be trademarks of their respective companies.

© 2012 NetIQ Corporation and its affiliates. All Rights Reserved.	             CSS90038A2A PO 08/12-F

More Related Content

What's hot

IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
Cosmin Bratu
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015John White
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3Ankita Dave
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyAlasdair Kilgour
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
ObserveIT
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecuritydrewz lin
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...HKISPA
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
Cary Sholer
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
Ken Huang
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
Pedro Espinosa
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN
ndelannoy
 

What's hot (18)

IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More Effectively
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN
 

Viewers also liked

Maria palacios
Maria  palaciosMaria  palacios
Maria palaciosbruiz47
 
Test internetddd
Test internetdddTest internetddd
Test internetddd
PUTAPERRACACHERA
 
Task english
Task englishTask english
Task english
JuJumaddie
 
Bioelements
BioelementsBioelements
Bioelementsadaura
 
Cuestionario resuelto
Cuestionario resueltoCuestionario resuelto
Cuestionario resueltoENCC
 
Actividad 5
Actividad 5Actividad 5
Actividad 5
Rouss Figueroa Soto
 
Ptacion proyecto
Ptacion proyectoPtacion proyecto
Ptacion proyecto
isadora_771
 

Viewers also liked (14)

Maria palacios
Maria  palaciosMaria  palacios
Maria palacios
 
Test internetddd
Test internetdddTest internetddd
Test internetddd
 
company profile yougie nagabhumi (hal 2)
company profile yougie nagabhumi (hal 2)company profile yougie nagabhumi (hal 2)
company profile yougie nagabhumi (hal 2)
 
Greece homework (summary)
Greece homework (summary)Greece homework (summary)
Greece homework (summary)
 
My
MyMy
My
 
Practica 27
Practica 27Practica 27
Practica 27
 
Task english
Task englishTask english
Task english
 
Itzel
ItzelItzel
Itzel
 
Comunicacion halloween
Comunicacion halloweenComunicacion halloween
Comunicacion halloween
 
Bioelements
BioelementsBioelements
Bioelements
 
SAYS IT ALL
SAYS IT ALLSAYS IT ALL
SAYS IT ALL
 
Cuestionario resuelto
Cuestionario resueltoCuestionario resuelto
Cuestionario resuelto
 
Actividad 5
Actividad 5Actividad 5
Actividad 5
 
Ptacion proyecto
Ptacion proyectoPtacion proyecto
Ptacion proyecto
 

Similar to NetIQ Customer Success Story - a2a

Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
IS Decisions
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
IS Decisions
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
Symantec
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
WSO2
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
IS Decisions
 
Nri touch
Nri touchNri touch
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
Adrian Dumitrescu
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal Regulations
Netwrix Corporation
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Etelä-Pohjanmaan kauppakamari - South Ostrobothnia Chamber of Commerce
 
Displacing the Programmers
Displacing the Programmers Displacing the Programmers
Displacing the Programmers
Newton Day Uploads
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
From Valleys to Clouds
From Valleys to CloudsFrom Valleys to Clouds
From Valleys to Clouds
Peter Coffee
 
Application Profile Knowledgeware
Application Profile KnowledgewareApplication Profile Knowledgeware
Application Profile Knowledgeware
GlenWhite
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iamArun Gopinath
 

Similar to NetIQ Customer Success Story - a2a (20)

Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
 
Nri touch
Nri touchNri touch
Nri touch
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal Regulations
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
 
Displacing the Programmers
Displacing the Programmers Displacing the Programmers
Displacing the Programmers
 
Authentic Venture case study
Authentic Venture case studyAuthentic Venture case study
Authentic Venture case study
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
From Valleys to Clouds
From Valleys to CloudsFrom Valleys to Clouds
From Valleys to Clouds
 
Application Profile Knowledgeware
Application Profile KnowledgewareApplication Profile Knowledgeware
Application Profile Knowledgeware
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iam
 

More from NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
NetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
NetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
NetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
NetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
NetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
NetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
NetIQ
 

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

NetIQ Customer Success Story - a2a

  • 1. SUCCESS STORY A2A Boosts Security Compliance With Identity Manager Executive Summary Industry Description Headquartered in in Milan and Brescia and serving the whole region of Lombardia, A2A specializes in the production, distribution and sale of electric energy, gas and district heating. It is one of Italy’s leading multi-utility groups. Business Situation A2A wanted a trusted and comprehensive solution that could help provide full and continuous control over its internal users’ Italian multi-utility group A2A specializes The NetIQ Solution access to any application. in the production, distribution and sale of electric energy and gas, and Following a competitive tender, A2A The NetIQ Difference the distribution and sale of district decided to implement Identity Manager. Identity Manager has provided A2A with the reliability and flexibility needed to heating. It provides its services to the manage the access rights of all 6,000 of entire region of Lombardia, and is “Identity Manager had all the features its users. The company can now comply currently one of Italy’s leading multi- we were looking for: flexibility, reliability, more easily with national regulations utility corporations, with future plans ease of configuration and use, and great around the security and protection of for international business growth. value for [the] money,” Cuscito said. confidential data. A2A must comply with a series of Working with Deloitte, A2A implemented NetIQ Products and Services national regulations and policies that Identity Manager in two phases. The Identity Manager establish the correct management of first was finalized in nine months. A2A identities and mitigation of business is currently undergoing phase two of risk. Gianfranco Cuscito, ICT manager the implementation and is confident of A2A, said, “We perceived pressure that it will be able to complete this on us because we lacked an automated phase within its 12-month time frame. and reliable tool to manage our users and detect any incorrect or suspect Identity Manager has enabled A2A action performed on our systems.” to create a standard set of rights and authorizations for regular users, As Cuscito explained, “Managing our and to use this set as a basis for 6,000 users’ authorisation profiles across subsequent changes, additions or multiple non-integrated applications removals of privileges. “The system and in some cases manually would not immediately recognizes who accesses have been feasible, in that it would an application, what their rights are have taken at least five days per person. and which applications they can We needed an automated solution use,” said Cuscito. “In this way, we can for managing users’ authorisation make sure that operational risks are profiles for critical applications.” removed or controlled and that the
  • 2. area manager agrees and updates the Identity Manager has also user’s set of privileges accordingly, revolutionized adding, removing or “The system immediately the system will automatically take editing a user’s set of rights. “In the in those changes and enable the past, these processes were performed recognizes who is person to continue their work.” manually and on paper sheets, wasting authorized to access considerable amounts of time and Identity Manager covers all the resources,” Cuscito said. “With Identity an application, what company’s core applications, which Manager all of this occurs automatically their rights are and are largely based on SAP software, and and in real time, allowing us to also will allow A2A to automatically understand right from the beginning which applications manage password synchronization. what is happening on our network, they can use.” and if assigning a certain role to a Using Identity Manager, A2A user is going to put us at risk or not.” Gianfranco Cuscito, helps ensure Compliance with As A2A pursues its plans for ICT Manager, A2A National Security Regulations international growth, IT is already With Identity Manager, A2A can planning to extend the successful manage all access to its numerous solution to the whole group. national regulations in terms of applications, and also determine segregation of duty are respected.” whether a certain user is allowed to Learn more today by contacting perform a specific task by accessing a your NetIQ® partner or a local NetIQ With Identity Manager, A2A can given application. “For instance,” said sales representative, or by visiting provision new users quickly and Cuscito, “if the same user performs www.netiq.com for contact easily, and apply all updates to actions belonging to separate information in your area. identity information in real time. areas—such as creating a purchase order, issuing an invoice and, finally, “When users need to access a entering the payment received—the particular area that they are normally system will warn us so that we can not allowed to use, they can ask take action accordingly and in a timely the area manager for a specific fashion, to avoid any possible risk.” authorization,” said Cuscito. “If the Worldwide Headquarters For a complete list of our offices 1233 West Loop South, Suite 810 in North America, Europe, the Houston, Texas 77027 USA Middle East, Africa, Asia-Pacific Worldwide: +1 713.548.1700 and Latin America, please visit U.S. / Canada Toll Free: 888.323.6768 www.netiq.com/contacts. info@netiq.com www.netiq.com http://community.netiq.com Follow us: NetIQ and the NetIQ logo are registered trademarks of NetIQ Corporation in the USA. All other company and product names may be trademarks of their respective companies. © 2012 NetIQ Corporation and its affiliates. All Rights Reserved. CSS90038A2A PO 08/12-F