SlideShare a Scribd company logo
S U C C E S S S T O R Y
Swisscard Saves Time and Effort
in Managing User Access
Executive Summary
INDUSTRY DESCRIPTION
Swisscard is a joint venture between
Credit Suisse and American Express.
Headquartered near Zurich, Swisscard
employs approximately 650 people and
acts as a service provider, handling credit
card business for Credit Suisse across
three brands: Visa, MasterCard
and American Express.
BUSINESS SITUATION
User management was a difficult and
time-consuming task at Swisscard.
The organization lacked a consistent
set of enterprise-wide processes
and platforms. Administration of
access rights was a challenge.
THE NETIQ DIFFERENCE
Swisscard selected Identity Manager,
Access Manager™ and Sentinel™ to
provide automated, audit-compliant
management of users and access rights.
PRODUCTS AND SERVICES
Identity Manager
Access Manager™
Sentinel™
IT Consulting
User management was a difficult and
time-consuming task at Swisscard.
The Swiss credit company had to
handle access rights to approximately
200 applications manually. A simple
request from the business to give a
new employee the same access rights
as an existing employee required the
IT team to first determine the existing
access rights, and then laboriously apply
them one by one to the new person.
Withdrawing access rights when an
employee switched departments or
left the company was equally difficult
and presented a potential security
risk. Swisscard wanted to standardize
and, where practical, automate the
provisioning and deprovisioning of users.
Most important, Swisscard wanted
to ensure easier and more efficient
compliance with regulations. The
company needed to comply with a
large number of local and international
regulations, and access rights to data and
systems needed to be fully auditable.
The Solution
Swisscard selected Identity Manager as
the basis for its identity management
environment, using Access Manager
to provide single sign-on services
and Sentinel™ to monitor and audit
compliance to guidelines and processes.
“As part of the selection process, we
looked closely at market analyses,
allowed manufacturers to present their
solutions and spoke to several different
manufacturers’reference customers,”said
Stefan Fischer, IT architect at Swisscard.
“The basic functions of all the different
solutions were quite similar, but we
wanted a tool that could be used by
nonspecialists without sacrificing any
power or functionality. In our opinion,
Identity Manager provided the most
intuitive and powerful solution.”
Swisscard undertook a phased
rollout of its identity management
solution, working with consultants
AECS
swisscard
Worldwide Headquarters
1233 West Loop South, Suite 810
Houston, Texas 77027 USA
Worldwide: +1 713.548.1700
U.S. / Canada Toll Free: 888.323.6768
info@netiq.com
www.netiq.com
http://community.netiq.com
For a complete list of our offices
in North America, Europe, the
Middle East, Africa, Asia-Pacific
and Latin America, please visit
www.netiq.com/contacts.
Follow us:
and local partner SkyPRO AG to
ensure the rapid and effective
deployment of the new software.
The combined project team used
Identity Manager to create a central
user repository that draws data from
Swisscard’s leading human resources
system and synchronizes it across all
corporate systems. Swisscard created
a set of business rules to govern
the assignment of access rights to
employees, including the definition
of approximately 100 business roles.
Identity Manager grants some rights
automatically, while users request
other rights that managers and
IT then approve and assign using
defined workflow processes with
respect to company guidelines.
Access Manager provides single sign-
on access to the main web-based
applications at Swisscard, so users no
longer need to remember dozens of
different credentials. Sentinel monitors
and logs all activity across the corporate
network and links it back to information
held in Identity Manager, enabling
faster and easier compliance with
audit regulations. Swisscard plans to
extend its use of Sentinel, making it
the cornerstone of its future security
information and event management
(SIEM) architecture.
Automated User Management
Identity Manager now automates
most user management tasks for
Swisscard. In addition to saving an
estimated 20 percent effort and
freeing up Swisscard’s IT team to
focus on more valuable tasks, the
solution ensures that changes in the
organizational chart are rapidly and
reliably reflected in the network.
“Identity Manager saves us considerable
time and effort in managing user
access to the company’s information
resources,”said Fischer.“The solution
gives us a clear, auditable view of
users and access rights, all managed
from a single point of control.”
When an employee leaves the company,
Identity Manager automatically revokes
all relevant access rights, closing
potential security holes and eliminating
the effort previously required to track
down and delete orphaned user
accounts. The solution also makes
it easier to comply with external
regulations by providing complete and
accurate reports on user access rights.
“The solution has become the
nerve center for user management
at Swisscard,”said Fischer.
Learn more today by contacting
your NetIQ partner or a local NetIQ
sales representative, or by visiting
www.netiq.com for contact
information in your area.
“... we wanted a tool
that could be used by
nonspecialists without
sacrificing any power
or functionality.”
Stefan Fischer,
IT Architect,
Swisscard
NetIQ, the NetIQ logo, Access Manager, and Sentinel are trademarks or registered trademarks of NetIQ Corporation in the USA.
All other company and product names may be trademarks of their respective companies.
© 2013 NetIQ Corporation and its affiliates. All Rights Reserved. 	 CSS90033SWSC PO 03/13 F

More Related Content

What's hot

Cbeyond company story
Cbeyond company storyCbeyond company story
Cbeyond company story
markhuelsmann
 
2015E VirTek Services
2015E VirTek Services2015E VirTek Services
2015E VirTek ServicesJohn Spearman
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
h-bauer2014
 
Ansarada Benefits & Client Projects
Ansarada Benefits & Client ProjectsAnsarada Benefits & Client Projects
Ansarada Benefits & Client ProjectsHaps 'Harry' Gill
 
Ensuring a return ready workplace
Ensuring a return ready workplaceEnsuring a return ready workplace
Ensuring a return ready workplace
Jun Song
 
BirthVenue Insurtech Pilot
BirthVenue Insurtech PilotBirthVenue Insurtech Pilot
BirthVenue Insurtech Pilot
BirthVenue
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
VISTA InfoSec
 
Join IDS as a dealer / reseller providing real time multidoor access security
Join IDS as a dealer / reseller providing real time multidoor access securityJoin IDS as a dealer / reseller providing real time multidoor access security
Join IDS as a dealer / reseller providing real time multidoor access security
pickmac
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
Micro Focus
 
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
ForgeRock
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
Group of company MUK
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
Ivanti
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
Strategic Business & IT Services
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Happiest Minds Technologies
 

What's hot (15)

Cbeyond company story
Cbeyond company storyCbeyond company story
Cbeyond company story
 
2015E VirTek Services
2015E VirTek Services2015E VirTek Services
2015E VirTek Services
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
 
Ansarada Benefits & Client Projects
Ansarada Benefits & Client ProjectsAnsarada Benefits & Client Projects
Ansarada Benefits & Client Projects
 
Ensuring a return ready workplace
Ensuring a return ready workplaceEnsuring a return ready workplace
Ensuring a return ready workplace
 
BirthVenue Insurtech Pilot
BirthVenue Insurtech PilotBirthVenue Insurtech Pilot
BirthVenue Insurtech Pilot
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Join IDS as a dealer / reseller providing real time multidoor access security
Join IDS as a dealer / reseller providing real time multidoor access securityJoin IDS as a dealer / reseller providing real time multidoor access security
Join IDS as a dealer / reseller providing real time multidoor access security
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
Overview
OverviewOverview
Overview
 
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 

Viewers also liked

Beatriz
BeatrizBeatriz
Beatriz
guest0d17c8
 
Beatriz
BeatrizBeatriz
Beatriz
guest0d17c8
 
Chem sem2review
Chem sem2reviewChem sem2review
Chem sem2review
whattheheckjusthappened
 

Viewers also liked (6)

Beatriz
BeatrizBeatriz
Beatriz
 
Investor Presentation may13
Investor Presentation may13Investor Presentation may13
Investor Presentation may13
 
Beatriz
BeatrizBeatriz
Beatriz
 
Ucs presentation 2011
Ucs presentation 2011Ucs presentation 2011
Ucs presentation 2011
 
Chem sem2review
Chem sem2reviewChem sem2review
Chem sem2review
 
TLE lessons
TLE lessonsTLE lessons
TLE lessons
 

Similar to Swisscard Saves Time and Effort in Managing User Access

The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
Merry D'souza
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processorLiora R. Herman
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
Axis Technology, LLC
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
NetIQ
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
Vikram Sareen
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
ControlCase
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Vertex Holdings
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
Citrix
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
Holly Vega
 
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk PoolEXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
Exigis
 
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
Zoho Corporation
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
EthosData
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
Infosec Train
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success Stories
LOGON Software
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
Ubisecure
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
Mint Group
 

Similar to Swisscard Saves Time and Effort in Managing User Access (20)

The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk PoolEXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
 
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success Stories
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 

More from NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
NetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
NetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
NetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
NetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
NetIQ
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
NetIQ
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
NetIQ
 

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Swisscard Saves Time and Effort in Managing User Access

  • 1. S U C C E S S S T O R Y Swisscard Saves Time and Effort in Managing User Access Executive Summary INDUSTRY DESCRIPTION Swisscard is a joint venture between Credit Suisse and American Express. Headquartered near Zurich, Swisscard employs approximately 650 people and acts as a service provider, handling credit card business for Credit Suisse across three brands: Visa, MasterCard and American Express. BUSINESS SITUATION User management was a difficult and time-consuming task at Swisscard. The organization lacked a consistent set of enterprise-wide processes and platforms. Administration of access rights was a challenge. THE NETIQ DIFFERENCE Swisscard selected Identity Manager, Access Manager™ and Sentinel™ to provide automated, audit-compliant management of users and access rights. PRODUCTS AND SERVICES Identity Manager Access Manager™ Sentinel™ IT Consulting User management was a difficult and time-consuming task at Swisscard. The Swiss credit company had to handle access rights to approximately 200 applications manually. A simple request from the business to give a new employee the same access rights as an existing employee required the IT team to first determine the existing access rights, and then laboriously apply them one by one to the new person. Withdrawing access rights when an employee switched departments or left the company was equally difficult and presented a potential security risk. Swisscard wanted to standardize and, where practical, automate the provisioning and deprovisioning of users. Most important, Swisscard wanted to ensure easier and more efficient compliance with regulations. The company needed to comply with a large number of local and international regulations, and access rights to data and systems needed to be fully auditable. The Solution Swisscard selected Identity Manager as the basis for its identity management environment, using Access Manager to provide single sign-on services and Sentinel™ to monitor and audit compliance to guidelines and processes. “As part of the selection process, we looked closely at market analyses, allowed manufacturers to present their solutions and spoke to several different manufacturers’reference customers,”said Stefan Fischer, IT architect at Swisscard. “The basic functions of all the different solutions were quite similar, but we wanted a tool that could be used by nonspecialists without sacrificing any power or functionality. In our opinion, Identity Manager provided the most intuitive and powerful solution.” Swisscard undertook a phased rollout of its identity management solution, working with consultants AECS swisscard
  • 2. Worldwide Headquarters 1233 West Loop South, Suite 810 Houston, Texas 77027 USA Worldwide: +1 713.548.1700 U.S. / Canada Toll Free: 888.323.6768 info@netiq.com www.netiq.com http://community.netiq.com For a complete list of our offices in North America, Europe, the Middle East, Africa, Asia-Pacific and Latin America, please visit www.netiq.com/contacts. Follow us: and local partner SkyPRO AG to ensure the rapid and effective deployment of the new software. The combined project team used Identity Manager to create a central user repository that draws data from Swisscard’s leading human resources system and synchronizes it across all corporate systems. Swisscard created a set of business rules to govern the assignment of access rights to employees, including the definition of approximately 100 business roles. Identity Manager grants some rights automatically, while users request other rights that managers and IT then approve and assign using defined workflow processes with respect to company guidelines. Access Manager provides single sign- on access to the main web-based applications at Swisscard, so users no longer need to remember dozens of different credentials. Sentinel monitors and logs all activity across the corporate network and links it back to information held in Identity Manager, enabling faster and easier compliance with audit regulations. Swisscard plans to extend its use of Sentinel, making it the cornerstone of its future security information and event management (SIEM) architecture. Automated User Management Identity Manager now automates most user management tasks for Swisscard. In addition to saving an estimated 20 percent effort and freeing up Swisscard’s IT team to focus on more valuable tasks, the solution ensures that changes in the organizational chart are rapidly and reliably reflected in the network. “Identity Manager saves us considerable time and effort in managing user access to the company’s information resources,”said Fischer.“The solution gives us a clear, auditable view of users and access rights, all managed from a single point of control.” When an employee leaves the company, Identity Manager automatically revokes all relevant access rights, closing potential security holes and eliminating the effort previously required to track down and delete orphaned user accounts. The solution also makes it easier to comply with external regulations by providing complete and accurate reports on user access rights. “The solution has become the nerve center for user management at Swisscard,”said Fischer. Learn more today by contacting your NetIQ partner or a local NetIQ sales representative, or by visiting www.netiq.com for contact information in your area. “... we wanted a tool that could be used by nonspecialists without sacrificing any power or functionality.” Stefan Fischer, IT Architect, Swisscard NetIQ, the NetIQ logo, Access Manager, and Sentinel are trademarks or registered trademarks of NetIQ Corporation in the USA. All other company and product names may be trademarks of their respective companies. © 2013 NetIQ Corporation and its affiliates. All Rights Reserved. CSS90033SWSC PO 03/13 F