Identity and Access Management - IDM365

31
idm365.com RECLAIM YOUR IDENTITY

Transcript of Identity and Access Management - IDM365

Page 1: Identity and Access Management - IDM365

idm365.com

RECLAIM YOUR IDENTITY

Page 2: Identity and Access Management - IDM365

idm365.com

PRESENTATION CONTENT

IDM365 IAM Software and Standards

IDM365 You and Our Key Features

IDM365 ROI & Implementation

IDM365 Concepts, methods and reporting

IAM Comparison

IAM Standards

IAM Software

IDM365 Self Service

IDM365 Workflow

10 Key IDM365 Features

IDM365 Reporting

Connection Methods

RBAC ABAC and Hybrid

IAM Comparison

IDM365 Implementation

IDM365 ROI

IDM365 Help Videos

Page 3: Identity and Access Management - IDM365

idm365.com

�  Identify users � Control user access � Determine user privileges � Delegate administrative authorities

IDM365 – IAM SOLUTION

Implementing IDM365 Identity Access Management solutions will automate and streamline your companies‘ employees‘ full life cycle

Page 4: Identity and Access Management - IDM365

idm365.com

IDM365 INFORMATION SECURITY

Identity & Access Management solutions can increase your company‘s information security in many ways.

� Control and overview over employee‘s accounts and access rights

� Security policies can be efficiently implemented through work flows

� Information security policies can be centrally managed

Breach of data

Source: PwC 2014 report

“And it’s important to note that insider threats are not necessarily a ‘bad guy with bad intentions; it could be a good employee doing righteous work in an insecure manner. Our problems are more human than technological.”

~ Michael E Mason, Chief Security Officer for Verizon

Page 5: Identity and Access Management - IDM365

idm365.com

SOME RELEVANT GLOBAL REGULATIONS   Finance Public

Sector Pharma & Life

Science Energy & Utilities

Technology and

Manufacturing

Sarbanes-Oxley Act of 2002 (SOX) Important     Important  

Basel II Important        

ISO 27001 Important Important Important Important  

Data Protection and Privacy   Important Important    

CoCo   Important Important    

PCI   Important Important    

NERC       Important  

FDA Important Important

FCPA Important Important

Page 6: Identity and Access Management - IDM365

idm365.com

Gartner IAM and IDM365 functionality comparison

View on gartner.com

Page 7: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED

Data maintenance and consistent alignment between systems

Actions of users

Identities

Entitlements

Activity

Identity can be managed by IDM365

Unique identifier and user info

IDM365 provides full control of entitlements

Rights of use

!

!

!

Example: Audit trails on all systems,

reports on all identities

Page 8: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED

IAM

Functions Key Components

Business Value

Identity Data

Data maintenance and consistent alignment between systems

Identities

Entitlements

Activity

Identity can be managed by IDM365

IDM365 provides full control of entitlements !

!

!

Example: Audit trails on all systems,

reports on all identities

Page 9: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON

IAM

Functions Key Components

Business Value

Identity Data

Gives control to the decision maker

Bulk user processing

Enables flexible utilization of resources

Effectiveness

Efficiency

Enablement

!

!

!

Example: Standardization of

workflows, built-in SoD’s

Page 10: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON

IAM

Functions Key Components

Business Value

Identity Data

Organization

Processes

Technology

Example: Temporary access handling,

Offline system support

Customizable, process based workflows and on-off board !

Organizational control and overview directly within IDM365

!

Integrates with all systems via standard API !

Page 11: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON

IAM

Functions Key Components

Business Value

Identity Data

Access

Intelligence

Administration

Example: Adapts to your

business terminology

IDM365 provides rule based approval workflows with SoD controls

and, automated attribute based permission assignment.

!

IDM365 – access; anywhere, at anytime, on any device !

IDM365 gives full user lifecycle management !

Page 12: Identity and Access Management - IDM365

idm365.com

GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON

IAM

Functions Key Components

Business Value

Identity Data

! !

!

! !

!

!

! ! !

!

!

Page 13: Identity and Access Management - IDM365

idm365.com

WHAT DOES IDM365 DO FOR YOU?

IDM365 IAM Software and Standards

IDM365 You and Our Key Features

IDM365 ROI & Implementation

IDM365 Concepts, methods and reporting

IAM Comparison

IAM Standards

IAM Software

IDM365 Self Service

IDM365 Workflow

10 Key IDM365 Features

IDM365 Reporting

Connection Methods

RBAC ABAC and Hybrid

IAM Comparison

IDM365 Implementation

IDM365 ROI

IDM365 Help Videos

Page 14: Identity and Access Management - IDM365

idm365.com

10 Key IDM365 Features* - by ITMC

1 Intuitive User-centric Interface Simple to use. Time savings. Cost savings.

2 Responsible Self-service IAG software Those who have authority and hands-on info can do the User Management.

3 Segregation of Duties (SoD) SoD is built into the framework. Meets compliance demands. E.g. Purchasing Job Function should not also have Invoicing JF.

4 Fast Implementation and Control IDM365 CLEAN / IDM365 ORGANIZE analyzes the data structure and recommends a new.

5 Compliance Enables businesses to comply with all regulatory demands (SOX, BASEL, ISO 27001, etc.).

6 Turn audits into a time to shine Keeps you compliant and audit ready always. Reports anytime.

7 Help “videos” Video tutorials (30 and growing). Covers most user procedures. Watch one or all.

8 Keep you in control One interface one truth. IDM365 can be acting as your “Single Point of Truth”.

9 Support Decades of experience and focus makes us specialist. Annual updates are included.

10 Cost Simple pricing. No unexpected add-ons. Cost saving implementation tools. Big ROI.

Page 15: Identity and Access Management - IDM365

idm365.com

SIMPLE BUT SECURE WORKFLOWS

Onboarding

Job Function: Accounting Assistant

!!

!

!

1 2 HR creates user and

requests access One or more

managers approve

5 min

Job Function: Financial

Management Reporting

?

?

5 -10 min

1 2 Manager requests

Additional access for user One or more job

function owners approve

3

Job Function: Accounting Assistant

Job Function: Financial

Management Reporting

!

!

This system critical request requires approval from the system owner.

IDM365 sends request automatically

Modification (add role, function, or attribute)

3 System intelligence

recognizes SoD violation.

Soft/hard stop

4 System intelligence

recognizes SoD violation.

Soft/hard stop

Page 16: Identity and Access Management - IDM365

idm365.com

IDM365 gives you happy employees

A typical scenario:

IT

days later...

HR

Manager HR and so on...

Manager

HR

Manager Account Sponsor

5 minutes later...

approve

IDM365 Here’s the path an email request might take before your new employee gets access

Page 17: Identity and Access Management - IDM365

idm365.com

MAKING THE COMPLEX SIMPLE

IDM365 IAM Software and Standards

IDM365 You and Our Key Features

IDM365 ROI & Implementation

IDM365 Concepts, methods and reporting

IAM Comparison

IAM Standards

IAM Software

IDM365 Self Service

IDM365 Workflow

10 Key IDM365 Features

IDM365 Reporting

Connection Methods

RBAC ABAC and Hybrid

IAM Comparison

IDM365 Implementation

IDM365 ROI

IDM365 Help Videos

Page 18: Identity and Access Management - IDM365

idm365.com

RBAC/ABAC HYBRID

RBAC

RBAC / ABAC Hybrid

Jason Philipson

Sales Manager UK Role 1

Sales Manager NL Role 2

Jason Philipson

Sales Manager JF

Location: NL

Location: UK

Customized job function for every user Takes time, adds risk.

Standardized job functions and attributes The user will receive only the access he needs.

Page 19: Identity and Access Management - IDM365

idm365.com

IDM365

RBAC / ABAC Hybrid Vs Role Based Access Control

required roles: 20 IDM365

Internal multi-function

employee

Job Function: Purchasing

Manager (travels as consultant to overseas branch)

Job Function: Sales Team

UK office

Job Function: Sales Team

Location: Germany

Germany office

A simple organization with only 20 job titles and 20 locations

required roles: 400

Page 20: Identity and Access Management - IDM365

idm365.com

IDM365 CONNECTION METHODS

We consume API’s

Standard API A majority of API’s exists or can be created (see ITMC API standard document). (incl. in license price)

Custom API API specifically developed by ITMC (not incl. in license price)

API helps create delete & modify user in system

IDM365 starts workflow and sends email to system owner to create user, IDM365 registers creation and logs in audit trail.

System owner

Offline System System is offline, or is treated as an offline system.

Page 21: Identity and Access Management - IDM365

idm365.com

� Choose between 11 built-in reports

� Add other available standard reports from the Standard report document

� Add client custom reports on demand

IDM365 AUDIT

Example: Deviation Report

Shows deviation between IDM365, and system as

well as reason.

IDM365 real-time reporting

Page 22: Identity and Access Management - IDM365

idm365.com

BEST PRACTISE IMPLEMENTATION

Rapid implementation – 30 days implementation process

2 IDM365:Clean tool - PDF/Excel

3 IDM365:Organize tool -PDF/Excel

4 IDM365:Audit system setup

1 Determine business and system scope. CIO

Sales

Manager Manager

Finance

Manager

Page 23: Identity and Access Management - IDM365

idm365.com

BEST PRACTISE IMPLEMENTATION

Rapid implementation – 30 days implementation process

2 IDM365:Clean tool - PDF/Excel

3 IDM365:Organize tool -PDF/Excel

4 IDM365:Audit system setup

1 Determine business and system scope.

Page 24: Identity and Access Management - IDM365

idm365.com

BEST PRACTISE IMPLEMENTATION

Rapid implementation – 30 days implementation process

2 IDM365:Clean tool - PDF/Excel

3 IDM365:Organize tool -PDF/Excel

4 IDM365:Audit system setup

1 Determine business and system scope.

Page 25: Identity and Access Management - IDM365

idm365.com

BEST PRACTISE IMPLEMENTATION

Rapid implementation – 30 days implementation process

2 IDM365:Clean tool - PDF/Excel

3 IDM365:Organize tool -PDF/Excel

4 IDM365:Audit system setup

1 Determine business and system scope. CIO

Sales

Manager Manager

Finance

Manager

Page 26: Identity and Access Management - IDM365

idm365.com

You can cut your dependency on us from day to day — just “unplug” it.

� No dependency

� No long extraction period

� Your in control

But we bet you won’t, because our software does exactly what you want it to.

WE TRUST THAT WE HAVE THE BEST IAM SOFTWARE

We think that you will love our product so much, that…

Page 27: Identity and Access Management - IDM365

idm365.com

COST SAVINGS AND BENEFITS

IDM365 IAM Software and Standards

IDM365 You and Our Key Features

IDM365 ROI & Implementation

IDM365 Concepts, methods and reporting

IAM Comparison

IAM Standards

IAM Software

IDM365 Self Service

IDM365 Workflow

10 Key IDM365 Features

IDM365 Reporting

Connection Methods

RBAC ABAC and Hybrid

IDM365 benefits and support

IDM365 Implementation

IDM365 ROI

IDM365 Help Videos

Page 28: Identity and Access Management - IDM365

idm365.com

CONTROL THE PROCESS 1. Workshop involving IT management and relevant business

management. Max 2 hours

2. Workshop involving relevant IT management and relevant system management. Max 2 hours

3.  Prepared by IDM365 project manager and consolidated with Client project manager

4.  The IDM:Clean analysis tool is then utilized to generate reports for each individual system involved. Output can be imported directly in system

5.  Identifying the job functions performed under each department or team, and the permissions they require; suitable representatives for each department will therefore be identified

6.  System is setup by the IDM365 experts

7.  Testing system before roll-out is essential, in order to make sure that testing takes all scenarios into consideration. Performed by client

8.  Beta Roll-out is used to ensure a successful Final Roll-out

9.  Final Roll-out – Training - certification

1.#Determine#Business#Scope#

2.#Determine#System#Scope#

3.#Determine#Implementa8on#Plan#

4.#Complete#IDM:Clean*##

5.#Complete#IDM:Organize*#

6.#Complete#IDM365#System#Setup#

7.#Complete#Tes8ng#

8.#Beta#RollHout#

9.#Final#RollHout#

*Auto generated

Page 29: Identity and Access Management - IDM365

idm365.com

IDM365 BENEFITS

1

2

3

4

Minimize time spent on on-boarding by up to 90%

Move workload from IT to business

Built in audit trail for all users on all systems

Gain business overview

5

6

7

8

Extensive reporting tool

Achieve good governance and minimize risk

Speed up implementation time on new systems

License alignment

9

10

11

12

30 day implementation process

Highten security

Save money

Gain flexibility with RBAC/ABAC hybrid

Page 30: Identity and Access Management - IDM365

idm365.com

� Training during implementation phases

� Training of Super Users + certification

� Video training on roll out

� Complete Service Catalogue with options for every need

� Rich follow up after implementation

ENSURE SUCCESS

How we support success

70% of all IT system introductions fail because of lacking “ease of use” We make sure you are guided in every step of the way

Page 31: Identity and Access Management - IDM365

idm365.com

Choose the service that fits you, from our vast Service Catalogue:

� Get a Custom Service package that fits you. (E.g. Workflows, Job function setup …)

� Choose service by the hour

IDM365 SERVICE

Let us help you – we do it every day

Due to unique insight and specialist knowledge, we can ensure that you are compliant with your compliance demands

on user management.

Do what you like to do, let us do the rest