SlideShare a Scribd company logo
1 of 16
Download to read offline
White paper
September 2009




                 Realizing business value with identity
                 and access management
Realizing business value with identity and access management
Page 2




                                           Executive summary
                   Contents
                                           Organizations are striving to realize business value from identity and access
                                           management security solutions by not only addressing short-term
        2    Executive summary
                                           requirements, such as costs reduction, integrating mergers and acquisitions,
        2    The business case for
             effective identity and        and effectively managing reductions in workforce, but also longer-term goals,
             access management             such as enabling the organization to implement growth initiatives through
        3    Identity management           new portal projects, and positioning the organization to quickly grow and leap
        5    Access management             ahead of competitors when global economic and business conditions improve.
       13    User compliance auditing
                                           IBM Tivoli® Identity and Access Assurance can help organizations realize
       15    Summary
                                           business value through a centralized, automated identity and access
       16    For more information
                                           management infrastructure that addresses the entire user lifecycle and helps
                                           improve service, reduce costs, and support compliance efforts. It also
                                           facilitates collaboration through role-based portals, enables the quick roll-out
                                           of new services, and provides simplified single sign-on capabilities.

                                           The business case for effective identity and access management
                                           Organizations face many security challenges, including managing an
                                           increasing number of users, applications, and access points—all while trying to
                                           ensure regulatory compliance. Many organizations see innovation as the
                                           means to achieve growth, but need a security infrastructure that provides
                                           convenient access to applications and systems while ensuring strong security
                                           and compliance with regulations. The effectiveness of an organization’s
                                           identity and access management can have a significant impact on its
                                           competitive posture and profitability.
Realizing business value with identity and access management
Page 3




                                             This white paper highlights the business value that numerous organizations
                   Highlights                across a wide range of industries have realized by implementing the
                                             IBM Tivoli Identity and Access Assurance solution. Organizations can realize
                                             business value with identity and access management in the following areas:

                                             ●    Identity management – on-boarding users and assigning access rights, to
                                                  changing user roles and privileges, to terminating access rights at the end
                                                  of the user lifecycle.
                                             ●    Access management – providing secure authentication of users, including
                                                  single sign-on (SSO), and enforcing access policies once the user has been
                                                  authenticated.
                                             ●    User compliance auditing – monitoring, auditing, and reporting on user
                                                  activity, helping organizations facilitate compliance with policies and
                                                  regulations, and reducing the risk of internal threats by monitoring user
                                                  behavior.

                                             Identity management
      By implementing the Tivoli solution,   By implementing the Tivoli solution, a South American bank was able to
      a South American bank was able to      reduce provisioning times for new employee accounts by 80 percent. And a
      reduce provisioning times for new      large European bank has reduced provisioning time, personnel hours, errors,
      employee accounts by 80 percent.       and orphan accounts, and de-provisioning is now much more accurate. The
                                             user management environment has become more adaptive, proactive, and
                                             responsive.

                                                An international brand-name apparel marketer and a retail consumer
                                             cooperative in Europe both reported that user account setup, which used to
                                             take as much as two days, now takes less than one hour to complete.
                                             Similarly, a U.S. university reduced the time to provision new users from two
                                             weeks to two days. The Tivoli solution also enables entitlement recertification
                                             for critical systems and accounts by class of services to allow the university to
                                             provide focus and auditing on its greatest points of risk.
Realizing business value with identity and access management
Page 4




                                              A European health insurance company uses the Tivoli solution to
                   Highlights              automatically synchronize any redundant data and eliminate excess accounts
                                           and authorizations, thereby reducing errors and the possibility of security
                                           breaches.

      At a global real estate company, a      Organizations can also leverage the software to boost efficiency, as did a
      single employee can now complete     global real estate company. The company’s Tivoli Identity and Access
      in one hour account management       Assurance solution reflects personnel changes within one business day, and
      operations that previously took      automatically eliminates dormant accounts. A single employee can now
      three or four people half a day to   complete in one hour account management operations that previously took
      complete.                            three or four people half a day to complete. In addition, contract, temporary,
                                           and part-time worker information is set to expire every three months, and an
                                           automated contract renewal confirmation is e-mailed to the appropriate
                                           manager 10 days before expiration.

                                              A financial services organization indicated that the Tivoli solution enabled
                                           them to streamline their provisioning process and integrate users from
                                           acquisitions quickly and easily. The increased efficiency and time savings
                                           enables them to focus more on their growth strategy and less on adding and
                                           managing users.

                                             In addition, the Tivoli solution helped an insurance agency improve
                                           responsiveness to customers by reducing from days to minutes the process of
                                           enabling access to applications and platforms using the automated workflow.
                                           It detects and deletes orphaned accounts, and now the company’s systems run
                                           faster and smoother, enabling the company to free up systems administrator
                                           resources.
Realizing business value with identity and access management
Page 5




                                               A European investment broker found that the centralized provisioning,
                    Highlights              authentication, and authorization infrastructure they gained from the software
                                            enabled its help desk to spend less time on access problems and more time on
                                            other issues. End users are now able to access their own role-based
                                            applications by authenticating only once, which makes navigating between
                                            various applications a quick and intuitive process. Within months of
                                            implementation, the organization reported that the solution had delivered a
                                            robust return on investment.

      A European insurance provider was        A European insurance provider was able to reduce administrative costs by
      able to reduce administrative costs   40 percent and eliminate 1,500 obsolete RACF® accounts just three months
      by 40 percent and eliminate           after deploying the Tivoli solution. And one year after implementation, an
      1,500 obsolete RACF accounts just     industrial truck manufacturer has successfully reduced costs, increased the
      three months after deploying the      efficiency of its IT department and automated and streamlined the
      Tivoli solution.                      management of all user profiles.

                                               A European telecommunication services provider has significantly reduced
                                            the time and resources required to manage the data access privileges of its
                                            employees, freeing its IT department to focus on critical business needs. At
                                            the same time the Tivoli solution also reduced the number of issues arising
                                            from security audits.

                                            Access management
                                            One health services organization reported that the Tivoli SSO capabilities
                                            simplified its end-user experience and improved time-to-information by
                                            eliminating the need for users to recall multiple IDs and passwords. Likewise,
                                            an insurance provider relies on Tivoli software to provide a secure, scalable
                                            SSO solution for its complex application environment. Branch personnel and
                                            customers can log onto its infrastructure from any Web-enabled browser.
Realizing business value with identity and access management
Page 6




                                                    The solution has increased the company’s efficiency, as users need only
                    Highlights                   enter a single user name and password to access applications. The solution
                                                 also changed the way the company interacts with its customers—they can now
                                                 access all of the company’s services through an easy-to-use Web interface. The
         “ Thanks to the fast
                                                 solution isolates security issues from application development, allowing the
           introduction of the new               company’s developers to focus on creating new applications that will increase
           system we have                        service levels for their insurance policyholders.
           withstood our audit with                 Tivoli Identity and Access Assurance enables collaboration without
           success and SAS-70                    compromising security at an executive training center where students use a
           certification is now a                 new social networking platform to effectively collaborate with one another and
           fact. This goes for both              their teachers. Using the new eLearning technology, users can create blogs,
                                                 develop virtual communities, and organize online activities. The IBM solution
           our business units and
                                                 enables secure collaboration with internal and external users with controlled
           for the corporate                     and secure access to information, applications and assets.
           organization. IBM Tivoli
                                                    Similarly, a financial corporation reported that its client representatives can
           software helps us in
                                                 log onto applications more quickly now that the process for entering
           achieving our type 2                  passwords is automated. The number of calls to the help desk for password
           certification for SAS-70.”             resets has been reduced, allowing more time to support client needs.
          —    Leon Verschoor, information and
               communications technology           Thanks to Tivoli Identity and Access Assurance, a European healthcare
               purchasing, Dutch Mn Services     system successfully improved the login times for critical departments such as
                                                 emergency rooms and intensive care units. The software has also been used
      With Tivoli Identity and Access            by a military organization where efficiency and security are essential. With its
      Assurance, a European healthcare           service-oriented architecture (SOA), users have SSO access to more than
      system successfully improved the           200 operational capabilities, including systems to manage munitions and
      login times for critical departments       equipment. This organization uses its new technology platform to deliver new
      such as emergency rooms and                capabilities more quickly and cost-effectively than before, and by separating
      intensive care units.                      services that are common to all applications, it avoids significant software
                                                 redevelopment costs.
Realizing business value with identity and access management
Page 7




                                              A Chinese insurance company now has a centralized, simplified and more
                                           secure sign-on center for all employees that need access to company systems.
                                           As a result, security administrators have significantly fewer login issues to deal
                                           with and can effectively prevent non-company logins.

                                              Using Tivoli Identity and Access Assurance to strengthen access with better
                                           authentication has helped a software company gain greater visibility of both
                                           physical and IT resource access. The company has also improved control
                                           through process automation. The solution has helped the company reduce the
                                           time and cost of managing employee access.

                                              Likewise, several healthcare providers reported enhanced security by
                                           minimizing poor end-user password behavior, and by seamlessly integrating
                                           strong authentication form factors. And an electric utility related the
                                           importance of self-service password capabilities, multi-factor authentication
                                           and integration with provisioning to streamline security and address
                                           government and corporate security requirements.

                                              An insurance company in Asia has implemented Tivoli Identity and Access
                                           Assurance to support mobile access with great success. With this solution,
                                           employees can work from any location without compromising the security of
                                           the company’s network. SSO capabilities provide employees personalized
                                           access to the network. And because the company’s sales agents can access
                                           information in real time, they are more responsive to clients. The company
                                           reported that sales revenue has already increased 18 percent.
Realizing business value with identity and access management
Page 8




                                            Access for new applications and services
                   Highlights               Services can be further improved by enabling collaboration via role-based
                                            portals that provide access to services and applications. Tivoli Identity and
      At one aviation maintenance
                                            Access Assurance can help organizations quickly roll out new services. For
      company, Tivoli Identity and Access
                                            instance, an aviation maintenance company implemented Tivoli Identity and
      Assurance automated the
                                            Access Assurance to automate the company’s manual user administration
      company’s manual user
                                            processes. This automation resulted in 30 percent faster provisioning and
      administration processes, resulting
                                            deprovisioning of user access rights for new applications.
      in 30 percent faster provisioning
      and deprovisioning of user access        The SSO capabilities of the solution eliminated repetitious authentication
      rights for new applications.          for users accessing different systems at an Asian software company, resulting
                                            in improved interdepartmental collaboration. The customer can deploy
                                            systems to a new site in one day, rather than the several weeks previously
                                            required. Likewise, by implementing Tivoli Identity and Access Assurance, a
                                            Canadian communications corporation achieved higher performance and
                                            improved maintainability. The solution makes it easier for the company to
                                            integrate new applications into its portal environment, facilitating delivery of
                                            more applications to field technicians.

                                               A Danish bank also implemented Tivoli Identity and Access Assurance, and
                                            as a result, reduced the development time for its Web applications, bringing
                                            new applications with more consistent security to market faster than ever. The
                                            solution has improved customer satisfaction, as users navigate only one
                                            authentication mechanism to access all of the bank’s applications. But the
                                            most important value is improved time-to-market for delivering new services
                                            to their customers.

                                               Both employees and business partners of a global automobile parts
                                            manufacturer can now access important company information through an
                                            easy-to-use portal, secured by Tivoli Identity and Access Assurance and using
                                            the low-cost Linux® operating system.
Realizing business value with identity and access management
Page 9




                                              At the same time, a leading pump manufacturer has significantly improved
                   Highlights              their time-to-market, business flexibility and responsiveness by using the
                                           Tivoli solution to provide its customers with secure access to an extranet so
                                           they can access product information and order online.

                                              Similarly, an Asian government agency created a portal application with
                                           single sign-on capabilities to enable the organization’s staff to access various
                                           business systems automatically, resulting in enhanced security and improved
                                           system usability.

      An Asian automotive company             An Asian automotive company estimates that the installation of Tivoli
      estimates that the installation of   security software has saved over US$100,000 by eliminating the need to
      Tivoli security software has saved   develop and support an in-house solution. The company has a dealer network
      over US$100,000 by eliminating the   application available online 24x7 and benefits from the Tivoli software’s
      need to develop and support an       ability to run unassisted – staff size has not been increased to support the new
      in-house solution.                   solution.

                                              Meanwhile, a leading credit card company in Korea enhanced the security
                                           of its infrastructure, increased employee productivity and reduced costs
                                           through the SSO capabilities of the Tivoli solution. The software speeds user
                                           access to the company’s non-integrated applications, making the system easier
                                           to negotiate and leading to a reduction in the number of calls to the help
                                           desk. Further, with the flexible, automated and transparent security layer in
                                           place, the company can confidently and easily adapt and expand applications.

                                              An Australian bank reported significant benefits from a new portal initiative
                                           secured by the Tivoli software. Users can now launch different functions
                                           without having to reauthenticate, and help desk requests for password issues
                                           have been reduced. The bank is now able to reuse functionality to create new
                                           sites. For example, a portal application created in one country for tracking
                                           Basel II regulation-related operational risk was successfully reused across
                                           other divisions around the world.
Realizing business value with identity and access management
Page 10




                                               Also in Australia, a government agency implemented a new portal to expose
                    Highlights              services, improving customer service and data delivery. And Tivoli software
                                            provides security and single-sign-on for the new portal, allowing users to
                                            access all applications once they have entered just a single password.

      By implementing Tivoli Identity and      By implementing Tivoli Identity and Access Assurance, a European banking
      Access Assurance, a European          group reduced development time for its Web applications by an average of six
      banking group reduced                 months, bringing new applications with more consistent security to market
      development time for its Web          faster than ever before and requiring fewer resources to maintain. The
      applications by an average of         solution also improved customer satisfaction, as users navigate only one
      six months.                           authentication mechanism to access all of the applications. And a European
                                            product manufacturer and distributor reduced the development expenses for
                                            new Web applications using the Tivoli solution. The company no longer needs
                                            to implement application-specific access management, since the Tivoli
                                            solution provides a centralized security service.

                                              In addition, a commercial truck distributor found that the Tivoli software’s
                                            central access management capabilities reduced development expenses and
                                            accelerated time-to-value for new Web applications by eliminating the need to
                                            implement access management and security mechanisms for each application.

                                              Since the time a U.S. state agency introduced a new portal secured by
                                            Tivoli software, the average daily volume of traffic has increased more than
                                            tenfold. With citizens and businesses finding answers to their queries via the
                                            portal instead of by mail or phone calls, the state has enjoyed improved
                                            employee productivity and cost savings on mailing materials.
Realizing business value with identity and access management
Page 11




                                                 An Asian bank also implemented a new portal that helps improve
                     Highlights               communication and promote knowledge and information sharing. Secured by
                                              Tivoli software, the portal can be leveraged as an entrance to access every
                                              operation from a single site location. It has also reduced operation workloads.

      With the Tivoli solution, a European       With the Tivoli solution, a European university provides secure SSO access
      university provides secure single       to all of its students, delivering a customized view of their resources, including
      sign-on access to all of its            integration with the virtual learning environment.
      students, delivering a customized
                                                A Canadian agri-business implemented a new portal environment that
      view of their resources, including
                                              provides customers and business partners with Web-based access to its
      integration with the virtual learning
                                              application environment. This approach streamlines business operations and
      environment.
                                              provides faster turnaround to customers. The organization was impressed that
                                              only IBM could provide the entire solution.

                                              Reducing access management administration
                                              The self-service capabilities of Tivoli Identity and Access Assurance can
                                              enhance the user experience by allowing users to manage their own accounts.
                                              Help desk costs can also be reduced with flexible SSO to applications and
                                              self-service password reset. For example, a South American bank
                                              implemented the solution and cut password-related calls to the help desk by
                                              35 percent. The solution enabled the company to reduce the number of
                                              passwords each user needed from seven to one. And an organization in the
                                              specialty materials industry achieved US$190,000 in savings in the first year
                                              alone by reducing the number of help desk calls associated with password
                                              resets.
Realizing business value with identity and access management
Page 12




                                               Tivoli Identity and Access Assurance can also detect and respond to
                   Highlights               password-related events to automate password management tasks. For
                                            example, using the Tivoli software, a European pension fund administrator
      Using the Tivoli software, a
                                            simplified access processes for users, resulting in a 25 percent reduction in
      European pension fund
                                            help desk costs related to password management. The new solution also
      administrator simplified access
                                            enables the company to complete full audits to ensure compliance with
      processes for users, resulting in a
                                            internal and governmental IT security standards. A school district in the U.S.
      25 percent reduction in helpdesk
                                            was also able to reduce help desk calls for password resets, as well as
      costs related to password
                                            improving auditability and accountability.
      management.
                                               With the implementation of Tivoli security, the user-management
                                            environment at a bank in Spain has become more adaptive, proactive, and
                                            responsive. The bank has reduced user-management costs and has enabled its
                                            IT staff to concentrate on other functions.

                                               A Canadian communications organization related that the IBM solution
                                            helped lower its operational costs while also enabling secure collaboration
                                            with internal and external users with controlled and secure access to
                                            information, applications and assets.

                                              The Tivoli solution enabled a European manufacturer to be more
                                            productive, cut overhead costs and increase security. The central Web access
                                            management solution simplifies account administration and enables the
                                            company to rely on fewer administration staff to manage and monitor user
                                            access. And a sporting goods retailer is excited about the flexibility that the
                                            Tivoli solution provides not only for SSO, but also to support federated
                                            identities across multiple organizations.
Realizing business value with identity and access management
Page 13




                                           User compliance auditing
                                           Tivoli Identity and Access Assurance solutions can help you provide the right
                                           access to the right users in a timely manner, and then close the loop with user
                                           compliance auditing. It uses W7 methodology to translate native log data into
                                           easily understood language that states Who, did What, When, Where, Where
                                           from, Where to, and on What. It closes the loop with compliance support by
                                           summarizing this information on a security compliance dashboard, helping to
                                           ensure that the right level of security is in place.




                                           Tivoli Identity and Access Assurance provides closed-loop identity and access management with
                                           user compliance.
Realizing business value with identity and access management
Page 14




                                           One European airport implemented Tivoli Identity and Access Assurance in
                                           order to facilitate compliance with international rules and laws. The
                                           organization is able to detect and deter unauthorized actions within its IT
                                           network, and analyze, evaluate and take action on user activity. Utilizing
                                           extensive reporting functionality, management has a much better overview of
                                           daily activity in its network.

                                              A global clothing manufacturer also found Tivoli software to be
                                           instrumental in ensuring that it achieved Sarbanes-Oxley compliance. The
                                           company took advantage of the software’s comprehensive reporting of account
                                           inventory and access as well as automated alerts to support compliance.
                                           Using the Tivoli security solution, a property management firm in Japan was
                                           able to establish a corporate compliance base for responding to Japan’s
                                           personal information protection laws, including the Japanese version of the
                                           Sarbanes-Oxley Act (J-SOX).

                                              In the healthcare industry, a regional medical center reported that Tivoli
                                           Identity and Access Assurance helped the organization meet HIPAA
                                           requirements. It also added significant business value. Clinical staff spend less
                                           time logging onto and off of applications, enabling them to focus on patient
                                           care. Operating costs were also reduced as a result of fewer password resets.
                                           And the solution supports the organization’s leadership position in attracting
                                           doctors and other clinical staff who demand best-of-class support
                                           technologies.

                                              A leading insurer in Europe uses the Tivoli solution to analyze, filter and
                                           respond to security incidents. This helps the organization improve its
                                           understanding of events and continue to fine-tune its security policy.
Realizing business value with identity and access management
Page 15




                                              A European land registry organization implemented the Tivoli security
                     Highlights            solution to automate collection and centralized storage of critical data from its
                                           mainframe and distributed systems. This reduces manual effort and frees up
                                           time for IT staff to focus on other competencies. The solution also enables
                                           non-specialist users to generate ad-hoc reports and queries on normalized
                                           data.

      Many healthcare organizations           Many healthcare organizations have automated the tracking and collating of
      have automated the tracking and      user access, and have used the detailed reporting provided by the Tivoli
      collating of user access, and have   solution to help address compliance requirements and HIPAA regulations.
      used the detailed reporting
                                              A retail consumer cooperative in Europe uses Tivoli solutions to provide
      provided by the Tivoli solution to
                                           automated compliance alerts for IT infrastructure roles to ensure policy
      help address compliance
                                           compliance, and to provide comprehensive reporting of accounts and access
      requirements and HIPAA
                                           activity to support compliance efforts.
      regulations.
                                           Summary
                                           Tivoli Identity and Access Assurance can help you manage user identities and
                                           access to resources with a centralized, automated identity and access
                                           management infrastructure and closed-loop user compliance capabilities. This
                                           solution can help you:

                                           ●   Reduce help desk costs associated with password management.
                                           ●   Integrate new identities from mergers and acquisitions.
                                           ●   Reduce application development costs relating to security coding.
                                           ●   Minimize the complexity of responding to internal and external controls
                                               and regulations.
                                           ●   Optimize productivity and costs by automating best practices for
                                               repeatable tasks.
                                           ●   Enable IT staff to focus on higher-value activities.
                                           ●   Provide the agility needed to capitalize on new business opportunities by
                                               removing barriers to innovation.
IBM Tivoli Identity and Access Assurance can help organizations realize                          © Copyright IBM Corporation 2009
                                                                                                   IBM Corporation Software Group
business value by improving service, reducing costs and complexity, and
                                                                                                   Route 100
supporting compliance efforts. IBM helps organizations address short-term                          Somers, NY 10589
                                                                                                   U.S.A.
requirements while positioning for long-term growth.
                                                                                                   Produced in the United States of America
For more information                                                                               September 2009
                                                                                                   All Rights Reserved
To learn more about Tivoli Identity and Access Assurance, contact your                             IBM, the IBM logo, ibm.com and Tivoli are
IBM representative or IBM Business Partner, or visit ibm.com/tivoli/security.                      trademarks or registered trademarks of
                                                                                                   International Business Machines Corporation in
                                                                                                   the United States, other countries, or both. If
                                                                                                   these and other IBM trademarked terms are
                                                                                                   marked on their first occurrence in this
                                                                                                   information with a trademark symbol (® or ™),
                                                                                                   these symbols indicate U.S. registered or
                                                                                                   common law trademarks owned by IBM at the
                                                                                                   time this information was published. Such
                                                                                                   trademarks may also be registered or common
                                                                                                   law trademarks in other countries. A current list
                                                                                                   of IBM trademarks is available on the Web at
                                                                                                   “Copyright and trademark information” at
                                                                                                   ibm.com/legal/copytrade.shtml.
                                                                                                   Linux is a registered trademark of Linus Torvalds
                                                                                                   in the United States, other countries, or both.
                                                                                                   Other company, product and service names
                                                                                                   may be trademarks or service marks of others.
                                                                                                   References in this publication to IBM products
                                                                                                   and services do not imply that IBM intends to
                                                                                                   make them available in all countries in which
                                                                                                   IBM operates.
                                                                                                   No part of this document may be reproduced or
                                                                                                   transmitted in any form without written
                                                                                                   permission from IBM Corporation.
                                                                                                   Product data has been reviewed for accuracy
                                                                                                   as of the date of initial publication. Product data
                                                                                                   is subject to change without notice. Any
                                                                                                   statements regarding IBM’s future direction and
                                                                                                   intent are subject to change or withdrawal
                                                                                                   without notice, and represent goals and
                                                                                                   objectives only.
                                            The customer is responsible for ensuring               THE INFORMATION PROVIDED IN THIS
                                            compliance with legal requirements. It is the          DOCUMENT IS DISTRIBUTED “AS IS”
                                            customer’s sole responsibility to obtain advice of     WITHOUT ANY WARRANTY, EITHER EXPRESS
                                            competent legal counsel as to the identification        OR IMPLIED. IBM EXPRESSLY DISCLAIMS
                                            and interpretation of any relevant laws and            ANY WARRANTIES OF MERCHANTABILITY,
                                            regulatory requirements that may affect the            FITNESS FOR A PARTICULAR PURPOSE OR
                                            customer’s business and any actions the                NON-INFRINGEMENT. IBM products are
                                            customer may need to take to comply with such          warranted according to the terms
                                            laws. IBM does not provide legal advice or             and conditions of the agreements
                                            represent or warrant that its services or              (e.g. IBM Customer Agreement, Statement of
                                            products will ensure that the customer is in           Limited Warranty, International Program License
                                            compliance with any law or regulation.                 Agreement, etc.) under which they are provided.




                                                                                                   TIW14040-USEN-00

More Related Content

What's hot

Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Bindu Rathore
 
Peoplesoft Success
Peoplesoft SuccessPeoplesoft Success
Peoplesoft Successbrighteyes
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Microsoft Norge AS
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsHappiest Minds Technologies
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesGlobal Business Events
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs ReadyTalk
 
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).Newgen Software Technologies Limited
 
Unlocking the value_of_your_application_content
Unlocking the value_of_your_application_contentUnlocking the value_of_your_application_content
Unlocking the value_of_your_application_contentQuestexConf
 
Payment giant-automates-internal-audit
Payment giant-automates-internal-auditPayment giant-automates-internal-audit
Payment giant-automates-internal-auditMetricStream Inc
 
Time attendance-hrview-case-study
Time attendance-hrview-case-studyTime attendance-hrview-case-study
Time attendance-hrview-case-studysanzen enterprises
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?C/D/H Technology Consultants
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 

What's hot (17)

Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013
 
Peoplesoft Success
Peoplesoft SuccessPeoplesoft Success
Peoplesoft Success
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
Ecm roadmap v2 0
Ecm roadmap v2 0Ecm roadmap v2 0
Ecm roadmap v2 0
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging times
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs
 
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).
E-Statement Solution using Newgen’s Omni Output Management Suite (O2MS).
 
Unlocking the value_of_your_application_content
Unlocking the value_of_your_application_contentUnlocking the value_of_your_application_content
Unlocking the value_of_your_application_content
 
Payment giant-automates-internal-audit
Payment giant-automates-internal-auditPayment giant-automates-internal-audit
Payment giant-automates-internal-audit
 
Time attendance-hrview-case-study
Time attendance-hrview-case-studyTime attendance-hrview-case-study
Time attendance-hrview-case-study
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Identity Management Project Roadmap
Identity Management Project RoadmapIdentity Management Project Roadmap
Identity Management Project Roadmap
 
Wp visibility banking
Wp visibility bankingWp visibility banking
Wp visibility banking
 

Viewers also liked

Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch managementArun Gopinath
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件長野市議会議員小泉一真
 
Hadoop, Big Data, and the Future of the Enterprise Data Warehouse
Hadoop, Big Data, and the Future of the Enterprise Data WarehouseHadoop, Big Data, and the Future of the Enterprise Data Warehouse
Hadoop, Big Data, and the Future of the Enterprise Data Warehousetervela
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France sioalex
 

Viewers also liked (17)

Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Secure by design
Secure by designSecure by design
Secure by design
 
Дживаноблисс
ДживаноблиссДживаноблисс
Дживаноблисс
 
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件
長野市大岡地区菜園つき椛内―「ながの田舎暮らし」オススメ物件
 
Issue 2 October 2010
Issue 2 October 2010Issue 2 October 2010
Issue 2 October 2010
 
Hello openstack 2014
Hello openstack 2014Hello openstack 2014
Hello openstack 2014
 
Кардиоблисс
КардиоблиссКардиоблисс
Кардиоблисс
 
Hadoop, Big Data, and the Future of the Enterprise Data Warehouse
Hadoop, Big Data, and the Future of the Enterprise Data WarehouseHadoop, Big Data, and the Future of the Enterprise Data Warehouse
Hadoop, Big Data, and the Future of the Enterprise Data Warehouse
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France
 
Get Solutions
Get SolutionsGet Solutions
Get Solutions
 

Similar to Realizing business value with identity and access management

Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingCiente
 
Federated identity and trust management redp3678
Federated identity and trust management redp3678Federated identity and trust management redp3678
Federated identity and trust management redp3678Banking at Ho Chi Minh city
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
A Financial Planning Leader Streamlines Audit, Risk and Compliance
A Financial Planning Leader Streamlines Audit, Risk and Compliance A Financial Planning Leader Streamlines Audit, Risk and Compliance
A Financial Planning Leader Streamlines Audit, Risk and Compliance MetricStream Inc
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Microsoft Dynamics CRM - Health And Social Services Whitepaper
Microsoft Dynamics CRM - Health And Social Services WhitepaperMicrosoft Dynamics CRM - Health And Social Services Whitepaper
Microsoft Dynamics CRM - Health And Social Services WhitepaperMicrosoft Private Cloud
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptxAnand Dhouni
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User ManagementNetIQ
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Sun Gerenciamento de Identidade com Segurança
Sun Gerenciamento de Identidade com SegurançaSun Gerenciamento de Identidade com Segurança
Sun Gerenciamento de Identidade com SegurançaVictor Castro
 

Similar to Realizing business value with identity and access management (20)

Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
 
Federated identity and trust management redp3678
Federated identity and trust management redp3678Federated identity and trust management redp3678
Federated identity and trust management redp3678
 
Internal Audit Solution
Internal Audit Solution Internal Audit Solution
Internal Audit Solution
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
A Financial Planning Leader Streamlines Audit, Risk and Compliance
A Financial Planning Leader Streamlines Audit, Risk and Compliance A Financial Planning Leader Streamlines Audit, Risk and Compliance
A Financial Planning Leader Streamlines Audit, Risk and Compliance
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
BFSI Case Sudies
BFSI Case SudiesBFSI Case Sudies
BFSI Case Sudies
 
Microsoft Dynamics CRM - Health And Social Services Whitepaper
Microsoft Dynamics CRM - Health And Social Services WhitepaperMicrosoft Dynamics CRM - Health And Social Services Whitepaper
Microsoft Dynamics CRM - Health And Social Services Whitepaper
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User Management
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Sun Gerenciamento de Identidade com Segurança
Sun Gerenciamento de Identidade com SegurançaSun Gerenciamento de Identidade com Segurança
Sun Gerenciamento de Identidade com Segurança
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Realizing business value with identity and access management

  • 1. White paper September 2009 Realizing business value with identity and access management
  • 2. Realizing business value with identity and access management Page 2 Executive summary Contents Organizations are striving to realize business value from identity and access management security solutions by not only addressing short-term 2 Executive summary requirements, such as costs reduction, integrating mergers and acquisitions, 2 The business case for effective identity and and effectively managing reductions in workforce, but also longer-term goals, access management such as enabling the organization to implement growth initiatives through 3 Identity management new portal projects, and positioning the organization to quickly grow and leap 5 Access management ahead of competitors when global economic and business conditions improve. 13 User compliance auditing IBM Tivoli® Identity and Access Assurance can help organizations realize 15 Summary business value through a centralized, automated identity and access 16 For more information management infrastructure that addresses the entire user lifecycle and helps improve service, reduce costs, and support compliance efforts. It also facilitates collaboration through role-based portals, enables the quick roll-out of new services, and provides simplified single sign-on capabilities. The business case for effective identity and access management Organizations face many security challenges, including managing an increasing number of users, applications, and access points—all while trying to ensure regulatory compliance. Many organizations see innovation as the means to achieve growth, but need a security infrastructure that provides convenient access to applications and systems while ensuring strong security and compliance with regulations. The effectiveness of an organization’s identity and access management can have a significant impact on its competitive posture and profitability.
  • 3. Realizing business value with identity and access management Page 3 This white paper highlights the business value that numerous organizations Highlights across a wide range of industries have realized by implementing the IBM Tivoli Identity and Access Assurance solution. Organizations can realize business value with identity and access management in the following areas: ● Identity management – on-boarding users and assigning access rights, to changing user roles and privileges, to terminating access rights at the end of the user lifecycle. ● Access management – providing secure authentication of users, including single sign-on (SSO), and enforcing access policies once the user has been authenticated. ● User compliance auditing – monitoring, auditing, and reporting on user activity, helping organizations facilitate compliance with policies and regulations, and reducing the risk of internal threats by monitoring user behavior. Identity management By implementing the Tivoli solution, By implementing the Tivoli solution, a South American bank was able to a South American bank was able to reduce provisioning times for new employee accounts by 80 percent. And a reduce provisioning times for new large European bank has reduced provisioning time, personnel hours, errors, employee accounts by 80 percent. and orphan accounts, and de-provisioning is now much more accurate. The user management environment has become more adaptive, proactive, and responsive. An international brand-name apparel marketer and a retail consumer cooperative in Europe both reported that user account setup, which used to take as much as two days, now takes less than one hour to complete. Similarly, a U.S. university reduced the time to provision new users from two weeks to two days. The Tivoli solution also enables entitlement recertification for critical systems and accounts by class of services to allow the university to provide focus and auditing on its greatest points of risk.
  • 4. Realizing business value with identity and access management Page 4 A European health insurance company uses the Tivoli solution to Highlights automatically synchronize any redundant data and eliminate excess accounts and authorizations, thereby reducing errors and the possibility of security breaches. At a global real estate company, a Organizations can also leverage the software to boost efficiency, as did a single employee can now complete global real estate company. The company’s Tivoli Identity and Access in one hour account management Assurance solution reflects personnel changes within one business day, and operations that previously took automatically eliminates dormant accounts. A single employee can now three or four people half a day to complete in one hour account management operations that previously took complete. three or four people half a day to complete. In addition, contract, temporary, and part-time worker information is set to expire every three months, and an automated contract renewal confirmation is e-mailed to the appropriate manager 10 days before expiration. A financial services organization indicated that the Tivoli solution enabled them to streamline their provisioning process and integrate users from acquisitions quickly and easily. The increased efficiency and time savings enables them to focus more on their growth strategy and less on adding and managing users. In addition, the Tivoli solution helped an insurance agency improve responsiveness to customers by reducing from days to minutes the process of enabling access to applications and platforms using the automated workflow. It detects and deletes orphaned accounts, and now the company’s systems run faster and smoother, enabling the company to free up systems administrator resources.
  • 5. Realizing business value with identity and access management Page 5 A European investment broker found that the centralized provisioning, Highlights authentication, and authorization infrastructure they gained from the software enabled its help desk to spend less time on access problems and more time on other issues. End users are now able to access their own role-based applications by authenticating only once, which makes navigating between various applications a quick and intuitive process. Within months of implementation, the organization reported that the solution had delivered a robust return on investment. A European insurance provider was A European insurance provider was able to reduce administrative costs by able to reduce administrative costs 40 percent and eliminate 1,500 obsolete RACF® accounts just three months by 40 percent and eliminate after deploying the Tivoli solution. And one year after implementation, an 1,500 obsolete RACF accounts just industrial truck manufacturer has successfully reduced costs, increased the three months after deploying the efficiency of its IT department and automated and streamlined the Tivoli solution. management of all user profiles. A European telecommunication services provider has significantly reduced the time and resources required to manage the data access privileges of its employees, freeing its IT department to focus on critical business needs. At the same time the Tivoli solution also reduced the number of issues arising from security audits. Access management One health services organization reported that the Tivoli SSO capabilities simplified its end-user experience and improved time-to-information by eliminating the need for users to recall multiple IDs and passwords. Likewise, an insurance provider relies on Tivoli software to provide a secure, scalable SSO solution for its complex application environment. Branch personnel and customers can log onto its infrastructure from any Web-enabled browser.
  • 6. Realizing business value with identity and access management Page 6 The solution has increased the company’s efficiency, as users need only Highlights enter a single user name and password to access applications. The solution also changed the way the company interacts with its customers—they can now access all of the company’s services through an easy-to-use Web interface. The “ Thanks to the fast solution isolates security issues from application development, allowing the introduction of the new company’s developers to focus on creating new applications that will increase system we have service levels for their insurance policyholders. withstood our audit with Tivoli Identity and Access Assurance enables collaboration without success and SAS-70 compromising security at an executive training center where students use a certification is now a new social networking platform to effectively collaborate with one another and fact. This goes for both their teachers. Using the new eLearning technology, users can create blogs, develop virtual communities, and organize online activities. The IBM solution our business units and enables secure collaboration with internal and external users with controlled for the corporate and secure access to information, applications and assets. organization. IBM Tivoli Similarly, a financial corporation reported that its client representatives can software helps us in log onto applications more quickly now that the process for entering achieving our type 2 passwords is automated. The number of calls to the help desk for password certification for SAS-70.” resets has been reduced, allowing more time to support client needs. — Leon Verschoor, information and communications technology Thanks to Tivoli Identity and Access Assurance, a European healthcare purchasing, Dutch Mn Services system successfully improved the login times for critical departments such as emergency rooms and intensive care units. The software has also been used With Tivoli Identity and Access by a military organization where efficiency and security are essential. With its Assurance, a European healthcare service-oriented architecture (SOA), users have SSO access to more than system successfully improved the 200 operational capabilities, including systems to manage munitions and login times for critical departments equipment. This organization uses its new technology platform to deliver new such as emergency rooms and capabilities more quickly and cost-effectively than before, and by separating intensive care units. services that are common to all applications, it avoids significant software redevelopment costs.
  • 7. Realizing business value with identity and access management Page 7 A Chinese insurance company now has a centralized, simplified and more secure sign-on center for all employees that need access to company systems. As a result, security administrators have significantly fewer login issues to deal with and can effectively prevent non-company logins. Using Tivoli Identity and Access Assurance to strengthen access with better authentication has helped a software company gain greater visibility of both physical and IT resource access. The company has also improved control through process automation. The solution has helped the company reduce the time and cost of managing employee access. Likewise, several healthcare providers reported enhanced security by minimizing poor end-user password behavior, and by seamlessly integrating strong authentication form factors. And an electric utility related the importance of self-service password capabilities, multi-factor authentication and integration with provisioning to streamline security and address government and corporate security requirements. An insurance company in Asia has implemented Tivoli Identity and Access Assurance to support mobile access with great success. With this solution, employees can work from any location without compromising the security of the company’s network. SSO capabilities provide employees personalized access to the network. And because the company’s sales agents can access information in real time, they are more responsive to clients. The company reported that sales revenue has already increased 18 percent.
  • 8. Realizing business value with identity and access management Page 8 Access for new applications and services Highlights Services can be further improved by enabling collaboration via role-based portals that provide access to services and applications. Tivoli Identity and At one aviation maintenance Access Assurance can help organizations quickly roll out new services. For company, Tivoli Identity and Access instance, an aviation maintenance company implemented Tivoli Identity and Assurance automated the Access Assurance to automate the company’s manual user administration company’s manual user processes. This automation resulted in 30 percent faster provisioning and administration processes, resulting deprovisioning of user access rights for new applications. in 30 percent faster provisioning and deprovisioning of user access The SSO capabilities of the solution eliminated repetitious authentication rights for new applications. for users accessing different systems at an Asian software company, resulting in improved interdepartmental collaboration. The customer can deploy systems to a new site in one day, rather than the several weeks previously required. Likewise, by implementing Tivoli Identity and Access Assurance, a Canadian communications corporation achieved higher performance and improved maintainability. The solution makes it easier for the company to integrate new applications into its portal environment, facilitating delivery of more applications to field technicians. A Danish bank also implemented Tivoli Identity and Access Assurance, and as a result, reduced the development time for its Web applications, bringing new applications with more consistent security to market faster than ever. The solution has improved customer satisfaction, as users navigate only one authentication mechanism to access all of the bank’s applications. But the most important value is improved time-to-market for delivering new services to their customers. Both employees and business partners of a global automobile parts manufacturer can now access important company information through an easy-to-use portal, secured by Tivoli Identity and Access Assurance and using the low-cost Linux® operating system.
  • 9. Realizing business value with identity and access management Page 9 At the same time, a leading pump manufacturer has significantly improved Highlights their time-to-market, business flexibility and responsiveness by using the Tivoli solution to provide its customers with secure access to an extranet so they can access product information and order online. Similarly, an Asian government agency created a portal application with single sign-on capabilities to enable the organization’s staff to access various business systems automatically, resulting in enhanced security and improved system usability. An Asian automotive company An Asian automotive company estimates that the installation of Tivoli estimates that the installation of security software has saved over US$100,000 by eliminating the need to Tivoli security software has saved develop and support an in-house solution. The company has a dealer network over US$100,000 by eliminating the application available online 24x7 and benefits from the Tivoli software’s need to develop and support an ability to run unassisted – staff size has not been increased to support the new in-house solution. solution. Meanwhile, a leading credit card company in Korea enhanced the security of its infrastructure, increased employee productivity and reduced costs through the SSO capabilities of the Tivoli solution. The software speeds user access to the company’s non-integrated applications, making the system easier to negotiate and leading to a reduction in the number of calls to the help desk. Further, with the flexible, automated and transparent security layer in place, the company can confidently and easily adapt and expand applications. An Australian bank reported significant benefits from a new portal initiative secured by the Tivoli software. Users can now launch different functions without having to reauthenticate, and help desk requests for password issues have been reduced. The bank is now able to reuse functionality to create new sites. For example, a portal application created in one country for tracking Basel II regulation-related operational risk was successfully reused across other divisions around the world.
  • 10. Realizing business value with identity and access management Page 10 Also in Australia, a government agency implemented a new portal to expose Highlights services, improving customer service and data delivery. And Tivoli software provides security and single-sign-on for the new portal, allowing users to access all applications once they have entered just a single password. By implementing Tivoli Identity and By implementing Tivoli Identity and Access Assurance, a European banking Access Assurance, a European group reduced development time for its Web applications by an average of six banking group reduced months, bringing new applications with more consistent security to market development time for its Web faster than ever before and requiring fewer resources to maintain. The applications by an average of solution also improved customer satisfaction, as users navigate only one six months. authentication mechanism to access all of the applications. And a European product manufacturer and distributor reduced the development expenses for new Web applications using the Tivoli solution. The company no longer needs to implement application-specific access management, since the Tivoli solution provides a centralized security service. In addition, a commercial truck distributor found that the Tivoli software’s central access management capabilities reduced development expenses and accelerated time-to-value for new Web applications by eliminating the need to implement access management and security mechanisms for each application. Since the time a U.S. state agency introduced a new portal secured by Tivoli software, the average daily volume of traffic has increased more than tenfold. With citizens and businesses finding answers to their queries via the portal instead of by mail or phone calls, the state has enjoyed improved employee productivity and cost savings on mailing materials.
  • 11. Realizing business value with identity and access management Page 11 An Asian bank also implemented a new portal that helps improve Highlights communication and promote knowledge and information sharing. Secured by Tivoli software, the portal can be leveraged as an entrance to access every operation from a single site location. It has also reduced operation workloads. With the Tivoli solution, a European With the Tivoli solution, a European university provides secure SSO access university provides secure single to all of its students, delivering a customized view of their resources, including sign-on access to all of its integration with the virtual learning environment. students, delivering a customized A Canadian agri-business implemented a new portal environment that view of their resources, including provides customers and business partners with Web-based access to its integration with the virtual learning application environment. This approach streamlines business operations and environment. provides faster turnaround to customers. The organization was impressed that only IBM could provide the entire solution. Reducing access management administration The self-service capabilities of Tivoli Identity and Access Assurance can enhance the user experience by allowing users to manage their own accounts. Help desk costs can also be reduced with flexible SSO to applications and self-service password reset. For example, a South American bank implemented the solution and cut password-related calls to the help desk by 35 percent. The solution enabled the company to reduce the number of passwords each user needed from seven to one. And an organization in the specialty materials industry achieved US$190,000 in savings in the first year alone by reducing the number of help desk calls associated with password resets.
  • 12. Realizing business value with identity and access management Page 12 Tivoli Identity and Access Assurance can also detect and respond to Highlights password-related events to automate password management tasks. For example, using the Tivoli software, a European pension fund administrator Using the Tivoli software, a simplified access processes for users, resulting in a 25 percent reduction in European pension fund help desk costs related to password management. The new solution also administrator simplified access enables the company to complete full audits to ensure compliance with processes for users, resulting in a internal and governmental IT security standards. A school district in the U.S. 25 percent reduction in helpdesk was also able to reduce help desk calls for password resets, as well as costs related to password improving auditability and accountability. management. With the implementation of Tivoli security, the user-management environment at a bank in Spain has become more adaptive, proactive, and responsive. The bank has reduced user-management costs and has enabled its IT staff to concentrate on other functions. A Canadian communications organization related that the IBM solution helped lower its operational costs while also enabling secure collaboration with internal and external users with controlled and secure access to information, applications and assets. The Tivoli solution enabled a European manufacturer to be more productive, cut overhead costs and increase security. The central Web access management solution simplifies account administration and enables the company to rely on fewer administration staff to manage and monitor user access. And a sporting goods retailer is excited about the flexibility that the Tivoli solution provides not only for SSO, but also to support federated identities across multiple organizations.
  • 13. Realizing business value with identity and access management Page 13 User compliance auditing Tivoli Identity and Access Assurance solutions can help you provide the right access to the right users in a timely manner, and then close the loop with user compliance auditing. It uses W7 methodology to translate native log data into easily understood language that states Who, did What, When, Where, Where from, Where to, and on What. It closes the loop with compliance support by summarizing this information on a security compliance dashboard, helping to ensure that the right level of security is in place. Tivoli Identity and Access Assurance provides closed-loop identity and access management with user compliance.
  • 14. Realizing business value with identity and access management Page 14 One European airport implemented Tivoli Identity and Access Assurance in order to facilitate compliance with international rules and laws. The organization is able to detect and deter unauthorized actions within its IT network, and analyze, evaluate and take action on user activity. Utilizing extensive reporting functionality, management has a much better overview of daily activity in its network. A global clothing manufacturer also found Tivoli software to be instrumental in ensuring that it achieved Sarbanes-Oxley compliance. The company took advantage of the software’s comprehensive reporting of account inventory and access as well as automated alerts to support compliance. Using the Tivoli security solution, a property management firm in Japan was able to establish a corporate compliance base for responding to Japan’s personal information protection laws, including the Japanese version of the Sarbanes-Oxley Act (J-SOX). In the healthcare industry, a regional medical center reported that Tivoli Identity and Access Assurance helped the organization meet HIPAA requirements. It also added significant business value. Clinical staff spend less time logging onto and off of applications, enabling them to focus on patient care. Operating costs were also reduced as a result of fewer password resets. And the solution supports the organization’s leadership position in attracting doctors and other clinical staff who demand best-of-class support technologies. A leading insurer in Europe uses the Tivoli solution to analyze, filter and respond to security incidents. This helps the organization improve its understanding of events and continue to fine-tune its security policy.
  • 15. Realizing business value with identity and access management Page 15 A European land registry organization implemented the Tivoli security Highlights solution to automate collection and centralized storage of critical data from its mainframe and distributed systems. This reduces manual effort and frees up time for IT staff to focus on other competencies. The solution also enables non-specialist users to generate ad-hoc reports and queries on normalized data. Many healthcare organizations Many healthcare organizations have automated the tracking and collating of have automated the tracking and user access, and have used the detailed reporting provided by the Tivoli collating of user access, and have solution to help address compliance requirements and HIPAA regulations. used the detailed reporting A retail consumer cooperative in Europe uses Tivoli solutions to provide provided by the Tivoli solution to automated compliance alerts for IT infrastructure roles to ensure policy help address compliance compliance, and to provide comprehensive reporting of accounts and access requirements and HIPAA activity to support compliance efforts. regulations. Summary Tivoli Identity and Access Assurance can help you manage user identities and access to resources with a centralized, automated identity and access management infrastructure and closed-loop user compliance capabilities. This solution can help you: ● Reduce help desk costs associated with password management. ● Integrate new identities from mergers and acquisitions. ● Reduce application development costs relating to security coding. ● Minimize the complexity of responding to internal and external controls and regulations. ● Optimize productivity and costs by automating best practices for repeatable tasks. ● Enable IT staff to focus on higher-value activities. ● Provide the agility needed to capitalize on new business opportunities by removing barriers to innovation.
  • 16. IBM Tivoli Identity and Access Assurance can help organizations realize © Copyright IBM Corporation 2009 IBM Corporation Software Group business value by improving service, reducing costs and complexity, and Route 100 supporting compliance efforts. IBM helps organizations address short-term Somers, NY 10589 U.S.A. requirements while positioning for long-term growth. Produced in the United States of America For more information September 2009 All Rights Reserved To learn more about Tivoli Identity and Access Assurance, contact your IBM, the IBM logo, ibm.com and Tivoli are IBM representative or IBM Business Partner, or visit ibm.com/tivoli/security. trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The customer is responsible for ensuring THE INFORMATION PROVIDED IN THIS compliance with legal requirements. It is the DOCUMENT IS DISTRIBUTED “AS IS” customer’s sole responsibility to obtain advice of WITHOUT ANY WARRANTY, EITHER EXPRESS competent legal counsel as to the identification OR IMPLIED. IBM EXPRESSLY DISCLAIMS and interpretation of any relevant laws and ANY WARRANTIES OF MERCHANTABILITY, regulatory requirements that may affect the FITNESS FOR A PARTICULAR PURPOSE OR customer’s business and any actions the NON-INFRINGEMENT. IBM products are customer may need to take to comply with such warranted according to the terms laws. IBM does not provide legal advice or and conditions of the agreements represent or warrant that its services or (e.g. IBM Customer Agreement, Statement of products will ensure that the customer is in Limited Warranty, International Program License compliance with any law or regulation. Agreement, etc.) under which they are provided. TIW14040-USEN-00