Download presentation
Presentation is loading. Please wait.
1
Identity & Access Management Services
Essential architectural review and deployment planning to start you on the path to success Rapid transfer of information to your staff for increased productivity & success Benefit from the deep expertise offered by IBM Security architects & consultants Solution Discovery & Planning Workshop Duration: 1 Day Architecture discussion and business requirements with use case review Implementation patterns, methodologies, strategies and lessons learned discussion Project staffing considerations and High-level security architecture approach Conceptual Architecture & High Level Design Duration: 3-4 weeks Review business objectives, requirements & use cases; discuss best fit architecture alternatives Analyze findings & requirements; develop solution architecture & initial design to provide timely business value Review initial deliverable for feedback and concurrence; deliver revised version as a solution roadmap Detailed Architecture, Design & Planning Duration: 3-8 weeks Includes activities described in Conceptual Architecture offering above Enhanced Architecture & Design detail for larger or more complex (multi-phase) projects; next level of configuration detail Milestone level implementation project planning & strategic roadmap for long term success Solution Assurance Review Duration: days Architecture guidance for problematic or stalled projects; architecture proposal verification, risk identification & mitigation Best practices, tuning & performance, high availability & scaling guidance Assurance that your IAM solution architecture & design can meet business objectives Recommendations / guidance for addressing current pain points & functional improvements Security Identity Governance (Add-On) Duration: weeks Solve a limited scope governance requirements using data imported from CSV, data integration with ISIM, or connectors Configure limited scope datasets for certification and role mining Provide ISIG UI for certification, access request, and role management Define manual process for remediation of campaign results and access fulfilment Security Identity Governance (Lifecycle) (Duration: weeks) Solve a limited scope of identity lifecycle requirements using data imported from HR Feed and connectors Configure limited scope datasets for onboarding and provisioning Provide ISIG UI for access and account requests, modifications and password self care Define business related integration for identity related activities
2
Identity & Access Management Services
Essential architectural review and deployment planning to start you on the path to success Rapid transfer of information to your staff for increased productivity & success Benefit from the deep expertise offered by IBM Security architects & consultants Identity & Access Management Services Custom Epic EMP Adapter Duration: 6 Weeks Fully automated Integration between the identity governance system and the Epic EMP application Automated Epic Account management from HR entry, correct access level granted (Template membership) Epic Adapter Functions: CRUD (Create/Read/Update/Delete), Enable/Disable, Reconciliation (Reverse data flow for compare op), Test ISIM Reporting Module - Base Duration: 3 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional ISIM Functions through new ISIM Reporting Framework: Distill huge amounts of data in ISIM to a simple easy-to-read report, Collect day-to-day operations into a mgmt list Provide mechanism for the business and auditors to run reports directly without direct admin support, trend analysis ISIM Reporting Module – Adv Duration: 4 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional ISIM Functions through new ISIM Reporting Framework: (Same as Base Reporting Module plus …) Maximum flexibility to synchronize / add additional user and account attributes Create a customized report based upon desired look-and-feel (logos, charts, graphs, text, etc.) PIM Reporting Module - Base Duration: 3 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional PIM Functions through new PIM Reporting Framework: Distill huge amounts of data in PIM to a simple easy-to-read report, Collect day-to-day operations into a mgmt list Provide mechanism for the business and auditors to run reports directly without direct admin support, trend analysis PIM Reporting Module - Adv Duration: 4 weeks Gain understanding of all the reporting options available, knowledge of standard and customized report frameworks Additional PIM Functions through new PIM Reporting Framework: (Same as Base Reporting Module plus …) Maximum flexibility to synchronize / add additional user and account attributes Create a customized report based upon desired look-and-feel (logos, charts, graphs, text, etc.) Federated Identity Setup - Base Duration: 2 weeks Gain understanding of both Web Security and Federated Identity Current Security Access Manager (ISAM) configured for Federated Registry, as well as Federated Identity for desired application: Users login to new application URL, which is intercepted by ISAM, authenticated, and then trusted secure session established to the managed application. Password management for application shifted to the new Federated Registry.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.