SlideShare a Scribd company logo
S U C C E S S S T O R Y
As the cellular telephone market leader
in South Africa, Vodacom operates
more than 6,400 base stations, putting
97 percent of the population within
its cellular coverage. Vodacom has a
highly mobile workforce of almost
10,000 people. The company outsources
much of its IT operations, base
station maintenance and call center
operations, creating a virtual workforce
around the core employees in its 20
corporate locations in South Africa.
Managing access—to physical buildings,
network resources and more than
100 corporate applications—for this
workforce is extremely challenging.
Contractors may work in different
locations on contracts of various lengths,
making it difficult for Vodacom to
maintain an accurate view of access rights.
Previously, Vodacom relied on line
managers to correctly provision and
deprovision contractors. Vodacom
wanted to close this potential security
loophole and simplify and accelerate
identity management, enabling zero-
day starts for new employees and
reducing administrative costs.
The Solution
Vodacom conducted a detailed
study of the identity management
solutions on the market and undertook
a proof of concept pitting Identity
Manager against an alternative.
Identity Manager and the enthusiasm
and local skills of NetIQ partner Ubusha
Technologies impressed Vodacom during
the proof of concept.“We knew that
success would depend not only on good
technology but also on strong local skills,”
said Trevor Owen, executive head of IT,
Region South, Vodacom South Africa.
Vodacom first wanted to improve
the deprovisioning process, starting
with the highest risk areas: access to
the IT network and physical access to
corporate sites. To this end, Vodacom
created a digital identity vault in
Identity Manager for all employees
and contractors and integrated it with
Vodacom’s SAP human resources system.
The combined team then synchronized
identity information across key
systems and conducted an intensive
Vodacom Tightens Security with
Identity Manager from NetIQ
Executive Summary
INDUSTRY DESCRIPTION
Vodacom is a Pan-African cellular
communications company that provides
world-class Global System for Mobile
Communications (GSM) service to more
than 35.7 million customers in South
Africa, Tanzania, the Democratic Republic
of the Congo, Lesotho and Mozambique.
BUSINESS SITUATION
Outside contractors constitute
approximately one third of Vodacom’s
workforce. As a telecommunications
business protecting confidential
customer data, Vodacom knew it had
to properly manage access for these
outside workers.
THE NETIQ DIFFERENCE
Vodacom used Identity Manager to
formalize and automate its identity and
security management. The solution
reliably removes access rights when
employees leave and significantly
reduces administrative workload.
PRODUCTS AND SERVICES
NetIQ® Identity Manager
NetIQ® Access Manager™
Worldwide Headquarters
1233 West Loop South, Suite 810
Houston, Texas 77027 USA
Worldwide: +1 713.548.1700
U.S. / Canada Toll Free: 888.323.6768
info@netiq.com
www.netiq.com
http://community.netiq.com
For a complete list of our offices
in North America, Europe, the
Middle East, Africa, Asia-Pacific
and Latin America, please visit
www.netiq.com/contacts.
Follow us:
data cleansing exercise. Vodacom
created for the first time a single
contractor database, fed by a
self-registration website.
By integrating Identity Manager
with its Microsoft Active Directory
services and physical access control
systems, Vodacom has automated
provisioning and deprovisioning of
network accounts and access rights
for employees and contractors.
“We can now reliably revoke all access
rights—physical and logical—on the
day that an employee or contractor
leaves Vodacom,”said Owen.
Vodacom has also implemented
Access Manager to provide users
with single sign-on across Microsoft
Active Directory and the various web
applications they use. By combining the
two products, Vodacom is now saving
significantly in time and administrative
effort. The next phase of the identity
and security management project at
Vodacom will see further integration
of applications with Identity Manager,
the introduction of identity self-service
tools, increased automation, integration
with partners and greater sophistication
in role-based provisioning.
Vodacom Prepares itself
for Future Gains
By using Identity Manager to
ensure immediate access-rights
deprovisioning, Vodacom has met
the key compliance objectives set
by its chief risk officer and helped
ensure security for sensitive data.
“As a telecommunications business,
Vodacom has legal obligations to
safeguard confidential customer
data,”said Owen. Identity Manager
helped Vodacom eliminate gaps
in its risk management process.
“Moving forward, our focus will
be on building the productivity
gains that we saw from day one.”
Identity Manager handles basic
provisioning at Vodacom, automatically
assigning an email address, network
login credentials and the appropriate
physical access rights. This has
eliminated the manual assignment
of credentials, saving significant
administrative time and effort
and accelerating the provisioning
timeline from days to hours.
The company can now put employees
to work on their first day.“By
giving them everything they need
immediately,”said Owen,“we can
differentiate Vodacom and ensure
that we attract the best applicants.”
Learn more today by contacting
your NetIQ partner or a local NetIQ
sales representative, or by visiting
www.netiq.com for contact
information in your area.
“Moving forward,
our focus will be on
building the productivity
gains that we saw
from day one.”
Trevor Owen,
Executive Head of IT, Region South,
Vodacom South Africa
NetIQ, the NetIQ logo and Access Manager are trademarks or registered trademarks of NetIQ Corporation in the USA. All
other company and product names may be trademarks of their respective companies.
© 2013 NetIQ Corporation and its affiliates. All Rights Reserved.	 CSS90076VODA PO 03/13 F

More Related Content

What's hot

Finpro market opportunity virtual mobile networks china
Finpro market opportunity virtual mobile networks chinaFinpro market opportunity virtual mobile networks china
Finpro market opportunity virtual mobile networks chinaBusiness Finland
 
Software and Services - Australian Shares Scan
Software and Services - Australian Shares ScanSoftware and Services - Australian Shares Scan
Software and Services - Australian Shares Scan
Share Trading
 
SWOT Analysis on Dialog PLC
SWOT Analysis on Dialog PLCSWOT Analysis on Dialog PLC
SWOT Analysis on Dialog PLCJetwing Travels
 
Dialog telekom limite1
Dialog telekom limite1Dialog telekom limite1
Dialog telekom limite1niroshiniz
 
TP Company Profile 20-Feb-2013
TP Company Profile 20-Feb-2013TP Company Profile 20-Feb-2013
TP Company Profile 20-Feb-2013Qusay Nader
 
Infocorp / Corporate Presentation
Infocorp / Corporate PresentationInfocorp / Corporate Presentation
Infocorp / Corporate Presentation
infocorpgroup
 
Case study- Telekom Serbia
Case study- Telekom SerbiaCase study- Telekom Serbia
Case study- Telekom Serbia
Bojan Jovic
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance
 
Dialog tranning
Dialog tranningDialog tranning
Dialog tranning
Hasitha Neelaka
 
Ch 08 mobile commerce
Ch 08 mobile commerceCh 08 mobile commerce
Ch 08 mobile commerce
naielofar
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Samsung SDS America
 
Dialog telekom & it’s internal dynamic
Dialog telekom & it’s internal dynamicDialog telekom & it’s internal dynamic
Dialog telekom & it’s internal dynamicRashmi Dissanayake
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
Infosys Finacle
 
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
R3
 
HeyAnita Korea Business Plan 2000
HeyAnita Korea Business Plan 2000HeyAnita Korea Business Plan 2000
HeyAnita Korea Business Plan 2000
Bernard Moon
 
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
Mücke Roth & Company
 

What's hot (17)

Finpro market opportunity virtual mobile networks china
Finpro market opportunity virtual mobile networks chinaFinpro market opportunity virtual mobile networks china
Finpro market opportunity virtual mobile networks china
 
Software and Services - Australian Shares Scan
Software and Services - Australian Shares ScanSoftware and Services - Australian Shares Scan
Software and Services - Australian Shares Scan
 
SWOT Analysis on Dialog PLC
SWOT Analysis on Dialog PLCSWOT Analysis on Dialog PLC
SWOT Analysis on Dialog PLC
 
Dialog telekom limite1
Dialog telekom limite1Dialog telekom limite1
Dialog telekom limite1
 
TP Company Profile 20-Feb-2013
TP Company Profile 20-Feb-2013TP Company Profile 20-Feb-2013
TP Company Profile 20-Feb-2013
 
Infocorp / Corporate Presentation
Infocorp / Corporate PresentationInfocorp / Corporate Presentation
Infocorp / Corporate Presentation
 
Case study- Telekom Serbia
Case study- Telekom SerbiaCase study- Telekom Serbia
Case study- Telekom Serbia
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Dialog tranning
Dialog tranningDialog tranning
Dialog tranning
 
Ch 08 mobile commerce
Ch 08 mobile commerceCh 08 mobile commerce
Ch 08 mobile commerce
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Dialog telekom & it’s internal dynamic
Dialog telekom & it’s internal dynamicDialog telekom & it’s internal dynamic
Dialog telekom & it’s internal dynamic
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
 
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
 
HeyAnita Korea Business Plan 2000
HeyAnita Korea Business Plan 2000HeyAnita Korea Business Plan 2000
HeyAnita Korea Business Plan 2000
 
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
Flash Insight: Are OTT Attackers in Pole Position to Make Use of eSIM?
 
Stc acquires bravo
Stc acquires bravoStc acquires bravo
Stc acquires bravo
 

Viewers also liked

Tpe Presentation En
Tpe Presentation EnTpe Presentation En
Tpe Presentation Enluisdiddl
 
Déclaration en ligne et paiement des impots, les nouveautés 2016
Déclaration en ligne et paiement des impots, les nouveautés 2016Déclaration en ligne et paiement des impots, les nouveautés 2016
Déclaration en ligne et paiement des impots, les nouveautés 2016
Valeur et Capital
 
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
AAEC_AFRICAN
 
Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2
Theoneste Ntalindwa
 
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutionsStratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
Microsoft Ideas
 
Sécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceSécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerce
Woomeet
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
Hossam Zein
 
Le commerce electronique en Tunisie
Le commerce electronique en TunisieLe commerce electronique en Tunisie
Le commerce electronique en Tunisie
mariem boussaffa
 
La Blockchain, une technologie révolutionnaire pour nos clients?
La Blockchain, une technologie révolutionnaire pour nos clients?La Blockchain, une technologie révolutionnaire pour nos clients?
La Blockchain, une technologie révolutionnaire pour nos clients?
Thibaut MEYER
 
TPE magazine Hors-série 2016
TPE magazine Hors-série 2016TPE magazine Hors-série 2016
TPE magazine Hors-série 2016
MKOMM&CONSEIL
 
Source1 (1)
Source1 (1)Source1 (1)
Source1 (1)
Houssem Bouhalli
 
Le paiement par mobile
Le paiement par mobileLe paiement par mobile
Le paiement par mobile
eGov Innovation Center
 
e-Commerce - Aspects juridiques
e-Commerce - Aspects juridiquese-Commerce - Aspects juridiques
e-Commerce - Aspects juridiquesCYB@RDECHE
 
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
Microsoft Technet France
 
Baromètre e-commerce des TPE-PME - édition 2015
Baromètre e-commerce des TPE-PME - édition 2015Baromètre e-commerce des TPE-PME - édition 2015
Baromètre e-commerce des TPE-PME - édition 2015
PowerBoutique
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_saveWoomeet
 
Les artisans et les TPE face au digital, étude proposée par +Simple.fr
Les artisans et les TPE face au digital, étude proposée par +Simple.frLes artisans et les TPE face au digital, étude proposée par +Simple.fr
Les artisans et les TPE face au digital, étude proposée par +Simple.fr
Frank Hennion
 
Paiements électronique
Paiements électroniquePaiements électronique
Paiements électronique
eGov Innovation Center
 
Index des paiements mobile 2016 - Edition Tourisme
Index des paiements mobile 2016 - Edition TourismeIndex des paiements mobile 2016 - Edition Tourisme
Index des paiements mobile 2016 - Edition Tourisme
Adyen
 

Viewers also liked (20)

Tpe Presentation En
Tpe Presentation EnTpe Presentation En
Tpe Presentation En
 
Déclaration en ligne et paiement des impots, les nouveautés 2016
Déclaration en ligne et paiement des impots, les nouveautés 2016Déclaration en ligne et paiement des impots, les nouveautés 2016
Déclaration en ligne et paiement des impots, les nouveautés 2016
 
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
Projet pilote de mise en oeuvre des échanges transfrontaliers du certificat d...
 
Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2
 
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutionsStratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
Stratégie Bring You Own Device (BYOD) et nouvelles directions de solutions
 
Sécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceSécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerce
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Presentation s2 m
Presentation s2 mPresentation s2 m
Presentation s2 m
 
Le commerce electronique en Tunisie
Le commerce electronique en TunisieLe commerce electronique en Tunisie
Le commerce electronique en Tunisie
 
La Blockchain, une technologie révolutionnaire pour nos clients?
La Blockchain, une technologie révolutionnaire pour nos clients?La Blockchain, une technologie révolutionnaire pour nos clients?
La Blockchain, une technologie révolutionnaire pour nos clients?
 
TPE magazine Hors-série 2016
TPE magazine Hors-série 2016TPE magazine Hors-série 2016
TPE magazine Hors-série 2016
 
Source1 (1)
Source1 (1)Source1 (1)
Source1 (1)
 
Le paiement par mobile
Le paiement par mobileLe paiement par mobile
Le paiement par mobile
 
e-Commerce - Aspects juridiques
e-Commerce - Aspects juridiquese-Commerce - Aspects juridiques
e-Commerce - Aspects juridiques
 
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
BYOD : les nouveaux scénarios d’authentification adaptés au monde de l’entrep...
 
Baromètre e-commerce des TPE-PME - édition 2015
Baromètre e-commerce des TPE-PME - édition 2015Baromètre e-commerce des TPE-PME - édition 2015
Baromètre e-commerce des TPE-PME - édition 2015
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_save
 
Les artisans et les TPE face au digital, étude proposée par +Simple.fr
Les artisans et les TPE face au digital, étude proposée par +Simple.frLes artisans et les TPE face au digital, étude proposée par +Simple.fr
Les artisans et les TPE face au digital, étude proposée par +Simple.fr
 
Paiements électronique
Paiements électroniquePaiements électronique
Paiements électronique
 
Index des paiements mobile 2016 - Edition Tourisme
Index des paiements mobile 2016 - Edition TourismeIndex des paiements mobile 2016 - Edition Tourisme
Index des paiements mobile 2016 - Edition Tourisme
 

Similar to Vodacom Tightens Security with Identity Manager from NetIQ

Intelligent CIO Africa Issue 10
Intelligent CIO Africa Issue 10Intelligent CIO Africa Issue 10
Intelligent CIO Africa Issue 10
Rachel Bates
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services sellingALEX CHANG
 
Insurance_Case-Study
Insurance_Case-StudyInsurance_Case-Study
Insurance_Case-StudyEstee Woods
 
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399thawban baig
 
Cd Anderson Portfolio Internet Solutions
Cd Anderson Portfolio Internet SolutionsCd Anderson Portfolio Internet Solutions
Cd Anderson Portfolio Internet Solutionscdanderson
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
teknologiinformasi
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
Redington Value Distribution
 
VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017
Mark Koh
 
Qoderoom Company Info and Portfolio
Qoderoom Company Info and PortfolioQoderoom Company Info and Portfolio
Qoderoom Company Info and Portfolio
qoderoom
 
Me 1016 ezine_pp20
Me 1016 ezine_pp20Me 1016 ezine_pp20
Me 1016 ezine_pp20
Kaizenlogcom
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
NetIQ
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
Cisco Case Studies
 
An analysis of the distribution channel of vodafone
An analysis of the distribution channel of vodafoneAn analysis of the distribution channel of vodafone
An analysis of the distribution channel of vodafone
Tirthankar Sutradhar
 
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02Michael Stebel
 
CareTech Case Study
CareTech Case StudyCareTech Case Study
CareTech Case Study
Santosh Patel
 
EgyptNetwork Company profile v5
EgyptNetwork Company profile v5EgyptNetwork Company profile v5
EgyptNetwork Company profile v5
Ahmed Ibrahim
 
Read and answer the question below. In early 2006, San-Antonio, .docx
Read and answer the question below. In early 2006, San-Antonio, .docxRead and answer the question below. In early 2006, San-Antonio, .docx
Read and answer the question below. In early 2006, San-Antonio, .docx
sleeperharwell
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation
Ishita Malhotra
 

Similar to Vodacom Tightens Security with Identity Manager from NetIQ (20)

Intelligent CIO Africa Issue 10
Intelligent CIO Africa Issue 10Intelligent CIO Africa Issue 10
Intelligent CIO Africa Issue 10
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services selling
 
Insurance_Case-Study
Insurance_Case-StudyInsurance_Case-Study
Insurance_Case-Study
 
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399
Company profile-pmcl-or-mobilink-gsm-is-the-market-leader1399
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
Cd Anderson Portfolio Internet Solutions
Cd Anderson Portfolio Internet SolutionsCd Anderson Portfolio Internet Solutions
Cd Anderson Portfolio Internet Solutions
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017
 
Qoderoom Company Info and Portfolio
Qoderoom Company Info and PortfolioQoderoom Company Info and Portfolio
Qoderoom Company Info and Portfolio
 
Case_Study_Midgard7
Case_Study_Midgard7Case_Study_Midgard7
Case_Study_Midgard7
 
Me 1016 ezine_pp20
Me 1016 ezine_pp20Me 1016 ezine_pp20
Me 1016 ezine_pp20
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
An analysis of the distribution channel of vodafone
An analysis of the distribution channel of vodafoneAn analysis of the distribution channel of vodafone
An analysis of the distribution channel of vodafone
 
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02
Mobileagencymanagementsolutions qqsolutions-130509171731-phpapp02
 
CareTech Case Study
CareTech Case StudyCareTech Case Study
CareTech Case Study
 
EgyptNetwork Company profile v5
EgyptNetwork Company profile v5EgyptNetwork Company profile v5
EgyptNetwork Company profile v5
 
Read and answer the question below. In early 2006, San-Antonio, .docx
Read and answer the question below. In early 2006, San-Antonio, .docxRead and answer the question below. In early 2006, San-Antonio, .docx
Read and answer the question below. In early 2006, San-Antonio, .docx
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation
 

More from NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
NetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
NetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
NetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
NetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
NetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
 

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Vodacom Tightens Security with Identity Manager from NetIQ

  • 1. S U C C E S S S T O R Y As the cellular telephone market leader in South Africa, Vodacom operates more than 6,400 base stations, putting 97 percent of the population within its cellular coverage. Vodacom has a highly mobile workforce of almost 10,000 people. The company outsources much of its IT operations, base station maintenance and call center operations, creating a virtual workforce around the core employees in its 20 corporate locations in South Africa. Managing access—to physical buildings, network resources and more than 100 corporate applications—for this workforce is extremely challenging. Contractors may work in different locations on contracts of various lengths, making it difficult for Vodacom to maintain an accurate view of access rights. Previously, Vodacom relied on line managers to correctly provision and deprovision contractors. Vodacom wanted to close this potential security loophole and simplify and accelerate identity management, enabling zero- day starts for new employees and reducing administrative costs. The Solution Vodacom conducted a detailed study of the identity management solutions on the market and undertook a proof of concept pitting Identity Manager against an alternative. Identity Manager and the enthusiasm and local skills of NetIQ partner Ubusha Technologies impressed Vodacom during the proof of concept.“We knew that success would depend not only on good technology but also on strong local skills,” said Trevor Owen, executive head of IT, Region South, Vodacom South Africa. Vodacom first wanted to improve the deprovisioning process, starting with the highest risk areas: access to the IT network and physical access to corporate sites. To this end, Vodacom created a digital identity vault in Identity Manager for all employees and contractors and integrated it with Vodacom’s SAP human resources system. The combined team then synchronized identity information across key systems and conducted an intensive Vodacom Tightens Security with Identity Manager from NetIQ Executive Summary INDUSTRY DESCRIPTION Vodacom is a Pan-African cellular communications company that provides world-class Global System for Mobile Communications (GSM) service to more than 35.7 million customers in South Africa, Tanzania, the Democratic Republic of the Congo, Lesotho and Mozambique. BUSINESS SITUATION Outside contractors constitute approximately one third of Vodacom’s workforce. As a telecommunications business protecting confidential customer data, Vodacom knew it had to properly manage access for these outside workers. THE NETIQ DIFFERENCE Vodacom used Identity Manager to formalize and automate its identity and security management. The solution reliably removes access rights when employees leave and significantly reduces administrative workload. PRODUCTS AND SERVICES NetIQ® Identity Manager NetIQ® Access Manager™
  • 2. Worldwide Headquarters 1233 West Loop South, Suite 810 Houston, Texas 77027 USA Worldwide: +1 713.548.1700 U.S. / Canada Toll Free: 888.323.6768 info@netiq.com www.netiq.com http://community.netiq.com For a complete list of our offices in North America, Europe, the Middle East, Africa, Asia-Pacific and Latin America, please visit www.netiq.com/contacts. Follow us: data cleansing exercise. Vodacom created for the first time a single contractor database, fed by a self-registration website. By integrating Identity Manager with its Microsoft Active Directory services and physical access control systems, Vodacom has automated provisioning and deprovisioning of network accounts and access rights for employees and contractors. “We can now reliably revoke all access rights—physical and logical—on the day that an employee or contractor leaves Vodacom,”said Owen. Vodacom has also implemented Access Manager to provide users with single sign-on across Microsoft Active Directory and the various web applications they use. By combining the two products, Vodacom is now saving significantly in time and administrative effort. The next phase of the identity and security management project at Vodacom will see further integration of applications with Identity Manager, the introduction of identity self-service tools, increased automation, integration with partners and greater sophistication in role-based provisioning. Vodacom Prepares itself for Future Gains By using Identity Manager to ensure immediate access-rights deprovisioning, Vodacom has met the key compliance objectives set by its chief risk officer and helped ensure security for sensitive data. “As a telecommunications business, Vodacom has legal obligations to safeguard confidential customer data,”said Owen. Identity Manager helped Vodacom eliminate gaps in its risk management process. “Moving forward, our focus will be on building the productivity gains that we saw from day one.” Identity Manager handles basic provisioning at Vodacom, automatically assigning an email address, network login credentials and the appropriate physical access rights. This has eliminated the manual assignment of credentials, saving significant administrative time and effort and accelerating the provisioning timeline from days to hours. The company can now put employees to work on their first day.“By giving them everything they need immediately,”said Owen,“we can differentiate Vodacom and ensure that we attract the best applicants.” Learn more today by contacting your NetIQ partner or a local NetIQ sales representative, or by visiting www.netiq.com for contact information in your area. “Moving forward, our focus will be on building the productivity gains that we saw from day one.” Trevor Owen, Executive Head of IT, Region South, Vodacom South Africa NetIQ, the NetIQ logo and Access Manager are trademarks or registered trademarks of NetIQ Corporation in the USA. All other company and product names may be trademarks of their respective companies. © 2013 NetIQ Corporation and its affiliates. All Rights Reserved. CSS90076VODA PO 03/13 F