Identity and Access Management - IDM365
Transcript of Identity and Access Management - IDM365
![Page 1: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/1.jpg)
idm365.com
RECLAIM YOUR IDENTITY
![Page 2: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/2.jpg)
idm365.com
PRESENTATION CONTENT
IDM365 IAM Software and Standards
IDM365 You and Our Key Features
IDM365 ROI & Implementation
IDM365 Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
![Page 3: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/3.jpg)
idm365.com
� Identify users � Control user access � Determine user privileges � Delegate administrative authorities
IDM365 – IAM SOLUTION
Implementing IDM365 Identity Access Management solutions will automate and streamline your companies‘ employees‘ full life cycle
![Page 4: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/4.jpg)
idm365.com
IDM365 INFORMATION SECURITY
Identity & Access Management solutions can increase your company‘s information security in many ways.
� Control and overview over employee‘s accounts and access rights
� Security policies can be efficiently implemented through work flows
� Information security policies can be centrally managed
Breach of data
Source: PwC 2014 report
“And it’s important to note that insider threats are not necessarily a ‘bad guy with bad intentions; it could be a good employee doing righteous work in an insecure manner. Our problems are more human than technological.”
~ Michael E Mason, Chief Security Officer for Verizon
![Page 5: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/5.jpg)
idm365.com
SOME RELEVANT GLOBAL REGULATIONS Finance Public
Sector Pharma & Life
Science Energy & Utilities
Technology and
Manufacturing
Sarbanes-Oxley Act of 2002 (SOX) Important Important
Basel II Important
ISO 27001 Important Important Important Important
Data Protection and Privacy Important Important
CoCo Important Important
PCI Important Important
NERC Important
FDA Important Important
FCPA Important Important
![Page 6: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/6.jpg)
idm365.com
Gartner IAM and IDM365 functionality comparison
View on gartner.com
![Page 7: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/7.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED
Data maintenance and consistent alignment between systems
Actions of users
Identities
Entitlements
Activity
Identity can be managed by IDM365
Unique identifier and user info
IDM365 provides full control of entitlements
Rights of use
!
!
!
Example: Audit trails on all systems,
reports on all identities
![Page 8: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/8.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED
IAM
Functions Key Components
Business Value
Identity Data
Data maintenance and consistent alignment between systems
Identities
Entitlements
Activity
Identity can be managed by IDM365
IDM365 provides full control of entitlements !
!
!
Example: Audit trails on all systems,
reports on all identities
![Page 9: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/9.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions Key Components
Business Value
Identity Data
Gives control to the decision maker
Bulk user processing
Enables flexible utilization of resources
Effectiveness
Efficiency
Enablement
!
!
!
Example: Standardization of
workflows, built-in SoD’s
![Page 10: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/10.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions Key Components
Business Value
Identity Data
Organization
Processes
Technology
Example: Temporary access handling,
Offline system support
Customizable, process based workflows and on-off board !
Organizational control and overview directly within IDM365
!
Integrates with all systems via standard API !
![Page 11: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/11.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions Key Components
Business Value
Identity Data
Access
Intelligence
Administration
Example: Adapts to your
business terminology
IDM365 provides rule based approval workflows with SoD controls
and, automated attribute based permission assignment.
!
IDM365 – access; anywhere, at anytime, on any device !
IDM365 gives full user lifecycle management !
![Page 12: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/12.jpg)
idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions Key Components
Business Value
Identity Data
! !
!
! !
!
!
! ! !
!
!
![Page 13: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/13.jpg)
idm365.com
WHAT DOES IDM365 DO FOR YOU?
IDM365 IAM Software and Standards
IDM365 You and Our Key Features
IDM365 ROI & Implementation
IDM365 Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
![Page 14: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/14.jpg)
idm365.com
10 Key IDM365 Features* - by ITMC
1 Intuitive User-centric Interface Simple to use. Time savings. Cost savings.
2 Responsible Self-service IAG software Those who have authority and hands-on info can do the User Management.
3 Segregation of Duties (SoD) SoD is built into the framework. Meets compliance demands. E.g. Purchasing Job Function should not also have Invoicing JF.
4 Fast Implementation and Control IDM365 CLEAN / IDM365 ORGANIZE analyzes the data structure and recommends a new.
5 Compliance Enables businesses to comply with all regulatory demands (SOX, BASEL, ISO 27001, etc.).
6 Turn audits into a time to shine Keeps you compliant and audit ready always. Reports anytime.
7 Help “videos” Video tutorials (30 and growing). Covers most user procedures. Watch one or all.
8 Keep you in control One interface one truth. IDM365 can be acting as your “Single Point of Truth”.
9 Support Decades of experience and focus makes us specialist. Annual updates are included.
10 Cost Simple pricing. No unexpected add-ons. Cost saving implementation tools. Big ROI.
![Page 15: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/15.jpg)
idm365.com
SIMPLE BUT SECURE WORKFLOWS
Onboarding
Job Function: Accounting Assistant
!!
!
!
1 2 HR creates user and
requests access One or more
managers approve
5 min
Job Function: Financial
Management Reporting
?
?
5 -10 min
1 2 Manager requests
Additional access for user One or more job
function owners approve
3
Job Function: Accounting Assistant
Job Function: Financial
Management Reporting
!
!
This system critical request requires approval from the system owner.
IDM365 sends request automatically
Modification (add role, function, or attribute)
3 System intelligence
recognizes SoD violation.
Soft/hard stop
4 System intelligence
recognizes SoD violation.
Soft/hard stop
![Page 16: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/16.jpg)
idm365.com
IDM365 gives you happy employees
A typical scenario:
IT
days later...
HR
Manager HR and so on...
Manager
HR
Manager Account Sponsor
5 minutes later...
approve
IDM365 Here’s the path an email request might take before your new employee gets access
![Page 17: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/17.jpg)
idm365.com
MAKING THE COMPLEX SIMPLE
IDM365 IAM Software and Standards
IDM365 You and Our Key Features
IDM365 ROI & Implementation
IDM365 Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
![Page 18: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/18.jpg)
idm365.com
RBAC/ABAC HYBRID
RBAC
RBAC / ABAC Hybrid
Jason Philipson
Sales Manager UK Role 1
Sales Manager NL Role 2
Jason Philipson
Sales Manager JF
Location: NL
Location: UK
Customized job function for every user Takes time, adds risk.
Standardized job functions and attributes The user will receive only the access he needs.
![Page 19: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/19.jpg)
idm365.com
IDM365
RBAC / ABAC Hybrid Vs Role Based Access Control
required roles: 20 IDM365
Internal multi-function
employee
Job Function: Purchasing
Manager (travels as consultant to overseas branch)
Job Function: Sales Team
UK office
Job Function: Sales Team
Location: Germany
Germany office
A simple organization with only 20 job titles and 20 locations
required roles: 400
![Page 20: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/20.jpg)
idm365.com
IDM365 CONNECTION METHODS
We consume API’s
Standard API A majority of API’s exists or can be created (see ITMC API standard document). (incl. in license price)
Custom API API specifically developed by ITMC (not incl. in license price)
API helps create delete & modify user in system
IDM365 starts workflow and sends email to system owner to create user, IDM365 registers creation and logs in audit trail.
System owner
Offline System System is offline, or is treated as an offline system.
![Page 21: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/21.jpg)
idm365.com
� Choose between 11 built-in reports
� Add other available standard reports from the Standard report document
� Add client custom reports on demand
IDM365 AUDIT
Example: Deviation Report
Shows deviation between IDM365, and system as
well as reason.
IDM365 real-time reporting
![Page 22: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/22.jpg)
idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope. CIO
Sales
Manager Manager
Finance
Manager
![Page 23: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/23.jpg)
idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
![Page 24: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/24.jpg)
idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
![Page 25: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/25.jpg)
idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope. CIO
Sales
Manager Manager
Finance
Manager
![Page 26: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/26.jpg)
idm365.com
You can cut your dependency on us from day to day — just “unplug” it.
� No dependency
� No long extraction period
� Your in control
But we bet you won’t, because our software does exactly what you want it to.
WE TRUST THAT WE HAVE THE BEST IAM SOFTWARE
We think that you will love our product so much, that…
![Page 27: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/27.jpg)
idm365.com
COST SAVINGS AND BENEFITS
IDM365 IAM Software and Standards
IDM365 You and Our Key Features
IDM365 ROI & Implementation
IDM365 Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IDM365 benefits and support
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
![Page 28: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/28.jpg)
idm365.com
CONTROL THE PROCESS 1. Workshop involving IT management and relevant business
management. Max 2 hours
2. Workshop involving relevant IT management and relevant system management. Max 2 hours
3. Prepared by IDM365 project manager and consolidated with Client project manager
4. The IDM:Clean analysis tool is then utilized to generate reports for each individual system involved. Output can be imported directly in system
5. Identifying the job functions performed under each department or team, and the permissions they require; suitable representatives for each department will therefore be identified
6. System is setup by the IDM365 experts
7. Testing system before roll-out is essential, in order to make sure that testing takes all scenarios into consideration. Performed by client
8. Beta Roll-out is used to ensure a successful Final Roll-out
9. Final Roll-out – Training - certification
1.#Determine#Business#Scope#
2.#Determine#System#Scope#
3.#Determine#Implementa8on#Plan#
4.#Complete#IDM:Clean*##
5.#Complete#IDM:Organize*#
6.#Complete#IDM365#System#Setup#
7.#Complete#Tes8ng#
8.#Beta#RollHout#
9.#Final#RollHout#
*Auto generated
![Page 29: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/29.jpg)
idm365.com
IDM365 BENEFITS
1
2
3
4
Minimize time spent on on-boarding by up to 90%
Move workload from IT to business
Built in audit trail for all users on all systems
Gain business overview
5
6
7
8
Extensive reporting tool
Achieve good governance and minimize risk
Speed up implementation time on new systems
License alignment
9
10
11
12
30 day implementation process
Highten security
Save money
Gain flexibility with RBAC/ABAC hybrid
![Page 30: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/30.jpg)
idm365.com
� Training during implementation phases
� Training of Super Users + certification
� Video training on roll out
� Complete Service Catalogue with options for every need
� Rich follow up after implementation
ENSURE SUCCESS
How we support success
70% of all IT system introductions fail because of lacking “ease of use” We make sure you are guided in every step of the way
![Page 31: Identity and Access Management - IDM365](https://reader038.fdocuments.in/reader038/viewer/2022102808/55d2ec58bb61eb91188b469e/html5/thumbnails/31.jpg)
idm365.com
Choose the service that fits you, from our vast Service Catalogue:
� Get a Custom Service package that fits you. (E.g. Workflows, Job function setup …)
� Choose service by the hour
IDM365 SERVICE
Let us help you – we do it every day
Due to unique insight and specialist knowledge, we can ensure that you are compliant with your compliance demands
on user management.
Do what you like to do, let us do the rest