1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.

Slides:



Advertisements
Similar presentations
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Advertisements

Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Service Provisioning Service Provider Consulting Microsoft Consulting Services harvests the knowledge, experience, and tools established by designing and.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Getting Smarter with Information An Information Agenda Approach
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IBM Academic Initiative Skills for a Smarter Planet Cloud Computing John Schilt Lead, IBM Academic Initiative Australia / New Zealand
CONNECT WITH US: IT: Customized to Your Advantage [Title] [Name] [Title] Public | Copyright © 2014 Prolifics.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Consero Private & Confidential CLOUD COMPUTING “Plug & Work” IT Applications Finance & Accounting Outsourcing (FAO) 5/26/2011 Consero - High Performance.
How eNet4S can benefit your project? eNet4S Software Solution Business Team Chief Technology Officer July 11, 2006.
Microsoft Operations Framework Morten Lauridsen Engagement Manager Microsoft Consulting Services Morten Lauridsen Engagement Manager.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Landstar Application Case Study: Development Of Content-rich Solutions For The Mobile Employee Bob Leo Director of Professional Services October 15, 2000.
Unlocking the Business Value of Information for Competitive Advantage
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
 TECHNOLOGIA is a startup company in Bangalore in 2007 which is completely owned by emirates telecommunication corporation- ETISALAT.  It has helped.
1© Copyright 2016 EMC Corporation. All rights reserved. VIRTUSTREAM XSTREAM APP DIRECTOR AUTOMATED, AGILE MANAGEMENT FOR SAP.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
Built on the Powerful Microsoft Azure Platform, HarmonyPSA Is a Cloud-Based Customer Service and Billing System for IT Solution Providers MICROSOFT AZURE.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
RSA Professional Services RSA SecurID Solution Design and Implementation (D&I) Services.
1© Copyright 2014 EMC Corporation. All rights reserved. Services Overview EMC Information Intelligence Group Maximizing the value of EMC software and cloud.
RSA Security Practice January 2010 RSA SecurID Solution Design and Implementation (D&I) Services.
1© Copyright 2011 EMC Corporation. All rights reserved. Workshop for Security Strategy Review Name, Title RSA, The Security Division of EMC.
SAM Baseline Review Engagement
Fourth Dimension Technologies
Interset Support Overview March 2017
TOPdesk Service Management Software on Azure
Segmap Solutions Mapping segments.
Inflectra User Summit May 18, 2017.
CIM Modeling for E&U - (Short Version)
SaaS Application Deep Dive
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Cherwell Service Management is an IT Service Management Solution that Makes it Easier for Users to Capitalize on Power of Microsoft Azure MICROSOFT AZURE.
THE RAPID-START ENTERPRISE SERVICE DESK
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Speaker’s Name, SAP Month 00, 2017
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
IBM Start Now Host Integration Solutions
Program Control Services – Overview
Transforming IT Management
2018 Real Cisco Dumps IT-Dumps
Replace with Application Image
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
Corporate Messaging Architecture by Segment
Harness the competitive advantages of Power BI and obtain business-critical insights with Adastra’s enterprise analytics platform using Microsoft Azure.
Business Intelligence & Analytics
ISG focusing on and dedicated for middleware technologies
Single Cell’s Progenitor Powered by Microsoft Azure Improves Organisational Efficiency with Strategic Procurement, Contract Management, and Analytics MICROSOFT.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
4/16/2019 5:07 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
Agenda The current Windows XP and Windows XP Desktop situation
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Capitalize on Your Business’s Technology
GTS Mobility Services introduction – who are we?
Agenda About us Industry expertise Service Contact us.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP Name Title Customer RSA SecurID

2© Copyright 2012 EMC Corporation. All rights reserved. Agenda Adapting to a Rapid Changing Security Landscape Customer Questions What We’ve Heard Authentication Manager Integration Services (AMIS) Customer Successes Success Metrics RSA’s Services Approach Why RSA for Services

3© Copyright 2012 EMC Corporation. All rights reserved. Security Management – Minimizing complexity, costs and risk. “While certainly improving security, Multi-Factor Authentication can be seen as a nonrecoverable cost that the business might balk at” Forrester

4© Copyright 2012 EMC Corporation. All rights reserved. Rapid Changing Security Landscape Security Management in a complex environment Security functionality to reduce risk Minimize operational costs & complexity Proactive approach to security management Self-service & automated provisioning capabilities User and administrative convenience Effective user and credential management Improved scalability through better integration Adapting to a Rapid Changing Security Landscape

5© Copyright 2012 EMC Corporation. All rights reserved. Our Customers Are Asking Themselves How can I securely increase self-service capabilities? Is my implementation consistent with industry best practices? Is my security management performing at its best? How can I scale without increasing operational costs? How do I balance effective controls and user experience? How do I balance effective controls and user experience? Is my 2FA implementation leveraging my existing business workflows? Is my 2FA implementation leveraging my existing business workflows?

6© Copyright 2012 EMC Corporation. All rights reserved. What We’ve Heard Token provisioning automation and self- service capabilities Leverage web- service based security management Assure systems are easily upgradable to current versions (supportable state) Administrative portals and better business process integration Reduce security operational costs “ ” User and token management complexity ” “ A framework for security management that aligns with Business, Security and Compliance requirements Solution Supportability ” “ Performance and Scalability “ ”

7© Copyright 2012 EMC Corporation. All rights reserved. RSA Professional Services Authentication Manager Integration Services (AMIS) “A Services Approach to Customers’ Challenges”

8© Copyright 2012 EMC Corporation. All rights reserved. What is AMIS: Concept and Vision A middleware API framework, based on REST web services, which supports a variety of token provisioning, administration, and user self-service functions. Lightweight, platform independent, integration services layer Enables web developer-level resources to build integrated solutions for administrative & self-service capabilities Easier integration with existing business process workflows Standard APIs provide abstraction from RSA server versions Allows build out of custom applications and solutions on a variety of client platforms AMIS software Documentation: Installation and Configuration Guide API Guide Price: $28,000 USD Custom Application Support: $7,000 USD annually. Minimizing complexity, costs and risk Services to assist with design and implementation: Install AMIS software in a single customer environment. Solution design input and guidance on AMIS usage and integration. Assist with testing and troubleshooting of AMIS integration.

9© Copyright 2012 EMC Corporation. All rights reserved. AM Integration Services (AMIS) Platform

10© Copyright 2012 EMC Corporation. All rights reserved. Customer Success Business Workflow Integration for Token self-service Expand 2FA by deploying 3X the number of SecurID tokens (Hardware and Software). Solution Detailed design and planning of an integrated provisioning solution RSA Authentication Manager Integration Services (AMIS) Custom Development consulting NEEDS Leading multinational retailer that runs chains of large discount department stores and warehouse stores Token distribution integrated with existing customer provisioning system and workflow. The provisioning must be accomplished quickly and efficiently without increasing operational overhead. Minimize impact on current Help Desk operations. Increased Self-Service capabilities, through IVR integration; minimizing Help Desk escalations. High level of automation, hence increased efficiency and reduced operational overhead.

11© Copyright 2012 EMC Corporation. All rights reserved. Customer Success Wireless Dealer fraud solution for Device Authentication 2FA self-service and delegated provisioning to manage dealer trust Solution Design & planning of a provisioning and authentication solution RSA Authentication Manager Integration Services (AMIS) Custom Development consulting NEEDS Over 90 % reduction in fraudulent activity. Out-of-band 2FA authentication for dealer order verifications Integrate present Web framework with 2FA method(s) Increase accountability at all levels of business based on enhanced authentication. Streamlined workflow for all lines on business: provisioning, dealer and web authentication. American multinational global broadband, telecommunications and mobile telephony service provider. Reduction in abusive fraudulent activity with cellular agreements

12© Copyright 2012 EMC Corporation. All rights reserved. Success Metrics Reduced cost from automation and self- service Enhanced usability and user experience Increased 2FA solution management & supportability

13© Copyright 2012 EMC Corporation. All rights reserved. RSA’s Services Approach How do we do it?

14© Copyright 2012 EMC Corporation. All rights reserved. How we do it Services for Holistic Solution Fulfillment Requirements Analysis and Assessment of the current state along with Remediation Planning and Roadmaps for the target state. Architecture & Design of Technology and Operations solutions to meet requirements Installation, Implementation, Integration, Customization and Optimization services Enabling go-forward solution management through Health-checks, Custom Knowledge Transfer, Personalized Support Programs, etc. Program & Project Management | Residencies | Education Services | Customer Support

15© Copyright 2012 EMC Corporation. All rights reserved. All stakeholder needs addressed How we do it Solution Framework for all needs Technical Needs Operations Needs Business Needs RSA Service Delivery Framework OperateStrategyDesignImplement

16© Copyright 2012 EMC Corporation. All rights reserved. Why Customers Choose RSA for Services Deep industry expertise Financial Services, Energy, Public Sector, Telecommunications, Media, Retail, Healthcare and Life Sciences Information-centric approach All engagements approached based on the value of information to the business and the need to protect it Holistic Solution Set & Domain Expertise Breadth & Depth of offerings with Business, Operations and Technology expertise Partner ecosystem Service Partners to facilitate holistic solution fulfillment on a global basis Leadership 30 year+ track record delivering holistic security solutions and THOUSANDS of engagements Scale and Stability Over 12,000 EMC service professionals with over 2,000 Business and Technology consultants. And EMC has been the leading investor in security.

17© Copyright 2012 EMC Corporation. All rights reserved. Q&AQ&AQ&AQ&A

18© Copyright 2012 EMC Corporation. All rights reserved. THANK YOU Thank you!