Identity & Access Management Services

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Software Quality Assurance Plan
First create and sign up for a blue host account Through the help of Blue Host create a WordPress website for the business After you created WordPress.
SP Business Suite Deployment Kick-off
DirectAccess Infrastructure Planning and Design Published: October 2009 Updated: November 2011.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Online Peer Evaluation System Team Green Apple Team Members Ada Tse Amber Bahl Tom Nichols Matt Anderson Faculty Mentor Prof. M Lutz Project Sponsor Richard.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
Identity Management, what does it solve By Gautham Mudra.
Business Transformation Health Check
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Microsoft Identity and Access Solutions Market Trends and Futures
Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.
Building a Mutually Rewarding Partnership [Your Company Name]’s Commitment to Delivering Unequaled Value to [Client Name] (Replace with client logo)
© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
The rSmart Group Kuali Days Successful Financial System Implementation Indianapolis April 11,
Oracle Application Express 3.0 Joel R. Kallman Software Development Manager.
Business Systems Development SDLC and introduction to the Microsoft Solutions Framework Team and Process Models.
QuickStart Toolkit & Template Extension Module Webinar 10 th of December 2009.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Software Engineering Management Lecture 1 The Software Process.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
On Demand Business © 2004 IBM Corporation Certification and Accreditation Sandra Jolla, Program Manager June 14, /10/04 IBM Certified for e-business.
Microsoft Corporation
Overview of RUP Lunch and Learn. Overview of RUP © 2008 Cardinal Solutions Group 2 Welcome  Introductions  What is your experience with RUP  What is.
Foundations of Geospatial System Development Todd S. Bacastow Professor of Practice for Geospatial Intelligence John A. Dutton e-Education Institute The.
Microsoft ® Forefront ™ Identity Manager 2010 Infrastructure Planning and Design Published: June 2010.
Project Discovery – Monday Holyoke 561 Most updates will only have 30 minutes maximum for their presentations. At least 10 minutes should be left for Q&A.
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
Enhanced Multi-Tenancy Features in IBM Cognos 10.2.x Rich Chester Director of Consulting John Antonucci Senior Business Development Manager The Webinar.
ITIL and Remedy ITSM Implementation Overview
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
© 2016 IBM Corporation Virtual Appliance migration self-assessment May 2016 IBM Security Identity Manager.
RSA Professional Services RSA SecurID Solution Design and Implementation (D&I) Services.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Planning Engagement Kickoff
Project Management PTM721S
Process 4 Hours.
Sample Fit-Gap Kick-off
IBM® Application Security Product Professional Services
Office 365 Security Assessment Workshop
IBM Security Identity Governance and Intelligence
Software Engineering Management
Office 365 FastTrack Planning Engagement Kickoff
Data Architecture World Class Operations - Impact Workshop.
SAP Value Assurance plan and safeguard service package for SAP SuccessFactors HCM Suite Business Needs Need to follow leading practices and reduce risk.
CAE-SCRUB for Incorporating Static Analysis into Peer Reviews
Project proposal for ISO 27001:2013 implementation
Premium Engagement Service Data Volume Management
Program Management Overview
Premium Engagement Service Data Volume Management
ITSM Governance is Imperative to Succeed
Project Ideation Agile Down-to-Earth © 2016.
Premium Engagement Service Data Volume Management
Seismic Implementation Kickoff
Delivery of Solutions Information Management
ISG focusing on and dedicated for middleware technologies
Microsoft Motion business architecture methodology
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Identity & Access Management Services Essential architectural review and deployment planning to start you on the path to success Rapid transfer of information to your staff for increased productivity & success Benefit from the deep expertise offered by IBM Security architects & consultants Solution Discovery & Planning Workshop Duration: 1 Day Architecture discussion and business requirements with use case review Implementation patterns, methodologies, strategies and lessons learned discussion Project staffing considerations and High-level security architecture approach Conceptual Architecture & High Level Design Duration: 3-4 weeks Review business objectives, requirements & use cases; discuss best fit architecture alternatives Analyze findings & requirements; develop solution architecture & initial design to provide timely business value Review initial deliverable for feedback and concurrence; deliver revised version as a solution roadmap Detailed Architecture, Design & Planning Duration: 3-8 weeks Includes activities described in Conceptual Architecture offering above Enhanced Architecture & Design detail for larger or more complex (multi-phase) projects; next level of configuration detail Milestone level implementation project planning & strategic roadmap for long term success Solution Assurance Review Duration: 10-15 days Architecture guidance for problematic or stalled projects; architecture proposal verification, risk identification & mitigation Best practices, tuning & performance, high availability & scaling guidance Assurance that your IAM solution architecture & design can meet business objectives Recommendations / guidance for addressing current pain points & functional improvements Security Identity Governance (Add-On) Duration: 12-16 weeks Solve a limited scope governance requirements using data imported from CSV, data integration with ISIM, or connectors Configure limited scope datasets for certification and role mining Provide ISIG UI for certification, access request, and role management Define manual process for remediation of campaign results and access fulfilment Security Identity Governance (Lifecycle) (Duration: 12-16 weeks) Solve a limited scope of identity lifecycle requirements using data imported from HR Feed and connectors Configure limited scope datasets for onboarding and provisioning Provide ISIG UI for access and account requests, modifications and password self care Define business related integration for identity related activities

Identity & Access Management Services Essential architectural review and deployment planning to start you on the path to success Rapid transfer of information to your staff for increased productivity & success Benefit from the deep expertise offered by IBM Security architects & consultants Identity & Access Management Services Custom Epic EMP Adapter Duration: 6 Weeks Fully automated Integration between the identity governance system and the Epic EMP application Automated Epic Account management from HR entry, correct access level granted (Template membership) Epic Adapter Functions: CRUD (Create/Read/Update/Delete), Enable/Disable, Reconciliation (Reverse data flow for compare op), Test ISIM Reporting Module - Base Duration: 3 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional ISIM Functions through new ISIM Reporting Framework: Distill huge amounts of data in ISIM to a simple easy-to-read report, Collect day-to-day operations into a mgmt list Provide mechanism for the business and auditors to run reports directly without direct admin support, trend analysis ISIM Reporting Module – Adv Duration: 4 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional ISIM Functions through new ISIM Reporting Framework: (Same as Base Reporting Module plus …) Maximum flexibility to synchronize / add additional user and account attributes Create a customized report based upon desired look-and-feel (logos, charts, graphs, text, etc.) PIM Reporting Module - Base Duration: 3 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional PIM Functions through new PIM Reporting Framework: Distill huge amounts of data in PIM to a simple easy-to-read report, Collect day-to-day operations into a mgmt list Provide mechanism for the business and auditors to run reports directly without direct admin support, trend analysis PIM Reporting Module - Adv Duration: 4 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional PIM Functions through new PIM Reporting Framework: (Same as Base Reporting Module plus …) Maximum flexibility to synchronize / add additional user and account attributes Create a customized report based upon desired look-and-feel (logos, charts, graphs, text, etc.) Federated Identity Setup - Base Duration: 2 weeks Gain understanding of both Web Security and Federated Identity Current Security Access Manager (ISAM) configured for Federated Registry, as well as Federated Identity for desired application: Users login to new application URL, which is intercepted by ISAM, authenticated, and then trusted secure session established to the managed application. Password management for application shifted to the new Federated Registry.