Værdien af Identity & Access Governance

Size: px
Start display at page:

Download "Værdien af Identity & Access Governance"

Transcription

1 Værdien af Identity & Access Governance Identity as The New Perimeter Henrik Mohr, Director, Global IT Operation NNE Pharmaplan A/S Dubex Security & Risk Management Update 2015 May 21th 2015

2 Agenda Who is NNE Pharmaplan? Perimeter paradigm Traditional vs. new network Traditional vs. new - IT service stack What is it IAM can do? Technical Benefits why IT want it! Compliance Benefits why QA want it! Economic Benefits why the CFO want it! Why do I want it? Dell 1 IM examples How to build the case for IAM Privileged Account Management Learnings compiled by the project manager Presenter Further reading & contacts

3 Novo Nordisk A/S ansatte Omsætning 84 mia/år (fortjeneste 25 mia) Novozymes A/S ansatte Omsætning 12 mia/år (fortjeneste 3 mia) NNIT A/S ansatte Omsætning 2,3 mia/år NNE Pharmaplan A/S ansatte Omsætning 1,8 mia/år (fortjeneste 91 mio)

4 Traditional Perimeter Paradigm Applications File Servers Human Resource Active Directory The Evil Internet CRM

5 Traditional Perimeter Paradigm File Servers Human Resource Applications Active Directory VPN Tunnel The Evil Internet CRM

6 New Perimeter Paradigm Applications File Servers Human Resource Active Directory The Evil Internet? CRM What now!? elearning

7 New Perimeter Paradigm? File Servers Applications Human Resource Active Directory The Evil Internet HTTPS CRM elearning

8 IT service stack - in general Governance, Risk & Compliance Software / SaaS Applications, Data Platform / PaaS Operating System, Databases Infrastructure / IaaS Network, Storage, Servers, Hypervisor Identity IAM Privileged Acc. Mgmt.

9 IT service stack example: Intranet Governance, Risk & Compliance Software Intranet, Corporate News Platform Windows 2012, MS-SQL, IIS Infrastructure Cisco, EMC 2, Blades, VMware Identity Active Directory root IAM Privileged Acc. Mgmt.

10 IT service stack - In general Governance, Risk & Compliance Software / SaaS Applications, Data Platform / PaaS Operating System, Databases Infrastructure / IaaS Network, Storage, Servers, Hypervisor Identity IAM Privileged Acc. Mgmt.

11 IT service stack example: Microsoft Online (O365) Contract Management Governance, Risk & Compliance Microsoft O365 Black Box Black Box Identity Microsoft ADFS Microsoft IAM

12 Human Resource - Create new employees - Delete terminated employees - Change roles Workflows WEB Shop / end-user self service - Employee requests for access - Workflow based approval flow - Manager approvals - Data owner approvals - System owner approvals HR System PAM - Privileged access approval system - Reporting on privileged accesses usage - Session monitoring Privileged Account Management TPAM Identity & Access Management Access Governance User Administration Role Administration warnings, reports, etc. Active Directory Access governance based on system integrations (both standard and adapted) ADFS Document Management Collaborate (extranet) (Sharepoint Online based) Navision ERP SalesForce IT Security/Compliance Officer - Compliance Dashboard - Reporting on compliance for access and access rights to data/information File Servers Internal IT Services Microsoft Online (O365) , Lync Cloud based IT Services

13 Technical Benefits why IT want it! All user administration is automated and done in a timely manor HR system integrated with IAM Most processes are detailed as workflows you only think once it s very complicated to build the workflows! Source separation (kildesortering) data and system owners know their data much better than IT - and they do all the work! Better service to business workflows with automated processes and selfservice for customers are far better than manual processes handled via s, Servicedesk, post-it s, phone calls, Excel,.. self service for a few services Fever mistakes. No more embarrassing audit findings.

14 Compliance Benefits why QA want it! Compliance dashboard real-time. Know where the biggest risks are. Audit trails for all accesses and access changes - for file servers worldwide Extensive reporting capabilities built-in Audit/reporting can prove compliance to auditors Access rights of unstructured data - such as file servers - can be cleaned up ( reattestation ) on a regular basis First run done for 800 (of 1000) active shares worldwide shares in total Revision of - e.g. ERP/Finance - systems can be automated, and system owners can be alerted of unwanted access attempts - planned Policies ensuring segregation of duties can be enforced in workflows planned for ERP systems

15 Economic Benefits why the CFO want it! Arguing tangible benefits for IT projects is a dangerous endeavor. Building a business case for IAM requires a lot more than proving 300 hours/year saved in IT. An IAM system will free up time currently used for user and access administration! at least 1 FTE in China. More to come? You can try investigating the approximate time spend on daily/weekly/monthly tasks. Remember ALL systems. Not just AD, the ERP system and the odd file server. All of them. It is a challenging task! And it s hard to win. other companies may be different! Using IAM to clean up your user DB s, removing terminated users, dual accounts etc. can help prevent over-licensing of software (e.g. Microsoft CAL s). ongoing, waiting for full integration with O365 (Powershell scripts) Agility in processes. Self-service. Time to market for LoB will be faster than waiting for manual processes.

16 Why do I want it? Clean up legacy mess Too much unstructured data on file servers (>25 TB) governed by homemade IAM system - automate data owner identification, user access re-attestation, and continuous reporting to data owners, is a dream come trough access logging have been running for the last year, first re-attestation being done now Future proofing IT New Sharepoint Online based extranet (Collaborate) done including external users identities New Document Management System done in UAT New ERP system - ongoing Single sign-on for all new applications utilizing an Authentication API we may use TPAM to control application SQL access for web.config s instead Control cloud services (like O365 or SalesForce) - ongoing IT Security/Compliance Security and compliance I can trust for (almost) all systems. No admin can change accesses undetected supplemented with TPAM we reach full transparency Efficiency A transparent and consistent (web shop look-and-feel) user self-service for all requests Dell1IM Workflow engine will enable a more holistic user administration. Why not add users to all relevant system in one process instead of numerous manual processes?

17 Create external user for Collaborate - A transparent and consistent (web shop look-and-feel) user self-service for all requests web shop more difficult to customize and much less flexible than expected!

18 File shares New share and re-attestation

19 How to build the case for IAM As-Is Analysis - list all the things that doesn t work properly today - with emphasis on audit findings (if you have any) To-Be Scenarios - time saved both in IT and LoB - IT security and compliance - ready for cloud services Implementation Risks Very difficult project technically. Many system integrations have to be done. No guarantied success for all those legacy systems we all struggle with High demand for change management and communication to LoB Possibly an uphill battle teaching IT security alongside the project. Remember: no system will ensure compliance if end users are ignorant or ignore the rules!

20 Privileged Account Management Management of privileged accounts on all IT systems - Including shared administrative accounts for servers & services, service accounts, database accounts, network equipment etc. Administrators are granted only the rights they need - nothing more, nothing less - and all activity is tracked and audited Recommended extra tools

21 The truth about IAM IAM solutions are too expensive! Market is finally evolving, but vendors have difficulties finding the right price. Identity as a Service solutions will come soon. Expect e.g. Microsoft to move into the area. Financial institutions have been doing IAM for a while. The public sector and the pharmaceutical business are next. Beware some vendors make even more money helping you do the implementation than selling the software!

22 Learnings compiled by the project manager Sørg for at undervise alle involverede grundigt i, hvorledes den overordnede struktur i IAM er Undervis udviklere sørg for at gøre dem selvkørende så der kan økonomiseres med konsulenttimerne. [Interne ressourcer: 2x Developer (75%), 1x IT Architect (75%), 1x PM (50%)] Udnævn en løsningsarkitekt, som kan designe de enkelte løsninger og tage grundlæggende designbeslutninger fra start Anvend standard undgå customization! Begræns funktionaliteten keep it simple! Afdæk og ryd op i AD før du går i gang Start med en kravspecifikation, fortsæt med et løsningsdesign Underbyg dit løsningsdesign med prototyper; i første omgang måske blot med screen dumps Vis protoyperne for stakeholders ellers kan de ikke forholde sig til funktionaliteten Sørg for en grundig test eventuelt i produktion, hvor alle systemer er til stede. Men begrænset til få personer og områder, som ikke gør skade Sørg for at kommunikere til slutbrugerne ved FAQ eller anden information på intranet

23 Presenter Henrik Mohr Director, Global IT Operation NNE Pharmaplan IT Manager UK NDS Ltd (now Cisco) Southampton, United Kingdom From June 2015: Henrik Mohr Afdelingsleder KMD Group Security IT Manager DK NDS Denmark Copenhagen, Denmark AGENCY.COM Visionik Copenhagen, Denmark IT University of Copenhagen Master, IT Management and Strategy (ILS) LinkedIn dk.linkedin.com/in/hmohr University of Copenhagen B.Sc. Chemistry

24 Further reading Is Identity The New Perimeter? Gartner Identity and Access Management Summit Magic Quadrant for User Administration and Provisioning, Gartner Research (G ), December 2012 Author: E. Perkins A6: Cost, Consequence and Value: The Economics of IAM Speaker: Earl Perkins Contacts: Anders Funch Østergaard Software Account Executive Dell Software Group How do we measure the value of IAM? For many, justifying IAM has been elusive. It remains a horizontal concern in the vertical world of business services, something shared by all business functions but owned by none. How can an IAM project be reconciled with the budgets of business? Project group: Project Manager: Ebbe René Hjort IT Architect: Jakob Rohrmann Strøm Henriette Lykke Sales Manager - Enterprise Dubex A/S Gyngemose Parkvej 50 DK-2860 Søborg Developers: Cheng Zhang & Huai Zhi Sheng Consultant: Kristian Birk Thim, Dubex

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management

More information

Barnaby Jeans Sr. Solution Architect Business Critical Applications

Barnaby Jeans Sr. Solution Architect Business Critical Applications Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma

More information

Identity Access Management Challenges and Best Practices

Identity Access Management Challenges and Best Practices Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December

More information

Microsoft Azure Cloud for Solution Architects

Microsoft Azure Cloud for Solution Architects Microsoft Azure Cloud for Solution Architects Roy Kim @roykimtoronto roykimtoronto@gmail.com September 2015 About me 7+ years design and developing SharePoint solutions. 13+ career on the Microsoft technology

More information

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant Comply Prove it! Reduce the risk of security breaches by automating the tracking, alerting and reporting

More information

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com PCI DSS Compliance: The Importance of Privileged Management Marco Zhang marco_zhang@dell.com What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

CLOUDFORMS Open Hybrid Cloud

CLOUDFORMS Open Hybrid Cloud Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific Realizing the Benefits of Hybrid Cloud Anand MS Cloud Solutions Architect Microsoft Asia Pacific Agenda Key drivers for Hybrid Cloud Unified Cloud Strategy Example Use Cases How to get there Hybrid Cloud:

More information

LICENSTJEK OUTSOURCING

LICENSTJEK OUTSOURCING LICENSTJEK CLOUD OUTSOURCING DEPLOYMENT 1 Agenda Speaker Cloud Cloud Services DEMO Considerations Hosting EG Hosting Services DEMO Considerations Questions 2 Speaker Peter Schmidt Infrastructure Architect

More information

Take Control of Identities & Data Loss. Vipul Kumra

Take Control of Identities & Data Loss. Vipul Kumra Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees

More information

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer The 7 Tenets of IAM Putting Identity Management at the Center of Security Darran Rolls, Chief Technology Officer About SailPoint Magic Quadrant Leader, Gartner 2016 550+ Customers and Growing 95% Customer

More information

Private Cloud: Regain Control of IT

Private Cloud: Regain Control of IT Platform Private Cloud: Regain Control of IT Computing Songnian Zhou TORONTO 10/21/2010 Copyright 2009 Platform Computing Corporation. All Rights Reserved. The Evolving Data Center (1970-2008) From managing

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

GSX Monitor & Analyzer for Microsoft Lync 2013

GSX Monitor & Analyzer for Microsoft Lync 2013 GSX Monitor & Analyzer for Microsoft Lync 2013 When End User Performance...... Matters! GSX Solutions 2014 About GSX Solutions Founded 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland,

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Microsoft SharePoint THE PLATFORM ENTERPRISES NEED

Microsoft SharePoint THE PLATFORM ENTERPRISES NEED Microsoft SharePoint THE PLATFORM ENTERPRISES NEED Presentation Outline Purpose of the Presentation The Right Team Introduction to SharePoint SharePoint as DMS SharePoint ac ECM SharePoint for Workflows

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

Office 365 and SharePoint Local File Share Synchronization

Office 365 and SharePoint Local File Share Synchronization Office 365 and SharePoint Local File Share Synchronization Frank Daske Business Development Manager Layer2 30.03.2015 The Layer2 Cloud Connector can close many gaps and overcome limitations with Office

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

SESAM. Business Intelligence og Automation. June 2012

SESAM. Business Intelligence og Automation. June 2012 SESAM Business Intelligence og Automation June 2012 Gennemgang af forskellige Business Intelligence projekter og løsninger, med fokus på udnyttelse af flere datakilder i en produktionsvirksomhed. Poul

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved. Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT ACE G E R M A N Y Copyright 2012 Aras. All Rights Reserved. ACE Germany Leveraging the Cloud Rob McAveney Director of Product Management Aras Corp

More information

A Gentle Introduction to Cloud Computing

A Gentle Introduction to Cloud Computing A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years

More information

Community Cloud. Karsten Fogh Ho-Lanng, September 7 th 2011

Community Cloud. Karsten Fogh Ho-Lanng, September 7 th 2011 Community Cloud Karsten Fogh Ho-Lanng, September 7 th 2011 Global Sourcing Green IT Service Management Outsourcing Strategy CRM Global Sourcing Data Centre Cloud computing Competency Development Cloud

More information

Big Data Solution Transforms Healthcare with Faster Access to Information

Big Data Solution Transforms Healthcare with Faster Access to Information Microsoft SQL Server Customer Solution Case Study Big Data Solution Transforms Healthcare with Faster Access to Information Overview Country or Region: United Kingdom Industry: Professional services IT

More information

GSX Monitor & Analyzer. for Microsoft Lync 2013

GSX Monitor & Analyzer. for Microsoft Lync 2013 GSX Monitor & Analyzer for Microsoft Lync 2013 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600 customers In 40 countries GSX Solutions

More information

Orange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich

Orange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich Orange County Convention Center Orlando, Florida June 3-5, 2014 Architecturing the cloud for your SAP landscape Florian Stilkerich LEARNING POINTS What are the different types of Cloud Enterprise Architecture

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Migrating SaaS Applications to Windows Azure

Migrating SaaS Applications to Windows Azure Migrating SaaS Applications to Windows Azure Lessons Learned 04.04.2012 Speaker Introduction Deepthi Raju Marketing Technology Services Deepthi joined Smartbridge in 2005 and has over twenty years of technology

More information

Virtualization and IaaS management

Virtualization and IaaS management CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization

More information

Software as a Service

Software as a Service Cloud på System z? zenterprise Heterogeneous Virtual Infrastructure Application APP APP APP APP APP APP IT Process and Service OS and Middleware Workload-Aware Optimization Infrastructure Hardware Middleware

More information

About Panorama Software

About Panorama Software About Panorama Software 15 Years of Joint Unbeatable Innovation Global ISV and a Microsoft Gold Partner Delivering BI solutions for the MS platform for more that 15 Years Over 1,600 enterprise customers

More information

Hva vil du med Service management i din organisasjon?

Hva vil du med Service management i din organisasjon? Hva vil du med Service management i din organisasjon? Syscom, Oslo - 3. november 2015 Karsten Grinderslev STEPS AHEAD AGENDA Current situation The Service Management Strategy Maturity Strategy scope &

More information

BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L

BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. ACE 2012 I N TERNATIONAL Leveraging the Cloud Rob McAveney Director

More information

INTEGRATE OFFICE 365 WITH ON-PREMISE ERP

INTEGRATE OFFICE 365 WITH ON-PREMISE ERP INTEGRATE OFFICE 365 WITH ON-PREMISE ERP (level 200/300 IT PRO/DEV) Erik Schoenmakers Lead Developer @ejar Anco Stuij SharePoint Consultant @ancostuij INTERNET OF THINGS SOCIAL BUSINESS CLOUD COMPUTING

More information

Collaborating with External Users

Collaborating with External Users Collaborating with External Users Peter Carson March 10, 2015 Gold Sponsor Silver Sponsors Peter Carson President, Envision IT SharePoint MVP Virtual Technical Specialist, Microsoft Canada peter@envisionit.com

More information

How to Grow and Transform your Security Program into the Cloud

How to Grow and Transform your Security Program into the Cloud How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management

More information

QLIKVIEW IN THE ENTERPRISE

QLIKVIEW IN THE ENTERPRISE QLIKVIEW IN THE ENTERPRISE IT Overview The QlikView Business Discovery platform is a natural fit within an organization s Information Architecture, allowing IT and BI groups to serve the ever-growing analytical

More information

Service Orchestration

Service Orchestration June 2015 Service Orchestration Infos and Use Cases Falko Dautel Robert Thullner Agenda + Overview + Use Cases & Demos VM Provisioning with ServiceNow Employee Onboarding + Summary + Questions & Answers

More information

Extending Dynamics CRM with BPM processes using PNMsoft s Sequence Kinetics TM

Extending Dynamics CRM with BPM processes using PNMsoft s Sequence Kinetics TM Extending Dynamics CRM with BPM processes using PNMsoft s Sequence Kinetics TM Sequence Kinetics BPM Suite for Dynamics CRM Sequence Kinetics for Microsoft Dynamics CRM is a Intelligent BPMS (Business

More information

The Webcast will begin at 1:00pm EST. www.gig-werks.com

The Webcast will begin at 1:00pm EST. www.gig-werks.com Workflow throughout the Enterprise for Legal Firms and Departments The Webcast will begin at 1:00pm EST www.gig-werks.com Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with

More information

Best Practices for Cloud Automation & Integration November 7, 2013

Best Practices for Cloud Automation & Integration November 7, 2013 Best Practices for Cloud Automation & Integration November 7, 2013 Copyright 2013 Vivit Worldwide Hosted by Derek Hornby Vivit SIG Leader PPM SIG Copyright 2013 Vivit Worldwide Today s Presenter David

More information

Turnkey Technologies- A Closer Look

Turnkey Technologies- A Closer Look Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look

More information

Identity & Access Management

Identity & Access Management TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

VMware on VMware: Private Cloud Case Study Customer Presentation

VMware on VMware: Private Cloud Case Study Customer Presentation VMware on VMware: Private Cloud Case Study Customer Presentation 2009 VMware Inc. All rights reserved Agenda VMware IT landscape Motivations for the Cloud Private Cloud Stack Impact of moving to the Cloud

More information

Extending your datacenter to the cloud

Extending your datacenter to the cloud Extending your datacenter to the cloud Steve Beaumont @StevybSC http://www.poweronplatforms.com Chiyo Odika @MrChiyo http://www.mrchiyo.com Steve Beaumont Grimsby, United Kingdom @StevybSC Product Development

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Transformation to a ITaaS Model & the Cloud

Transformation to a ITaaS Model & the Cloud Transformation to a ITaaS Model & the Cloud CIO Summit - Miami November, 2014 John Cullen Laddie Suk EMC Global Professional Services John.cullen@emc.com Laddie.suk@emc.com 1 Agenda Business Challenges

More information

passionately simple. INTRODUCING REDTOO

passionately simple. INTRODUCING REDTOO passionately simple. INTRODUCING REDTOO ABOUT US Starting in Switzerland 25 years ago, we re now a successful global IT consulting company with offices spanning both sides of the Atlantic. We are a strategic

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

Accelerating DevOps With Copy Data Virtualization. June, 2015

Accelerating DevOps With Copy Data Virtualization. June, 2015 Accelerating DevOps With Copy Data Virtualization June, 2015 Agenda About Actifio DevOps Challenges Copy Data Virtualization For DevOps COPYRIGHT 2015 ACTIFIO 2 Agile Development and DevOps Is Everywhere

More information

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The image part with relationship ID rid2 was not found in the file. Insight

More information

GSX Monitor & Analyzer. for Microsoft SharePoint

GSX Monitor & Analyzer. for Microsoft SharePoint GSX Monitor & Analyzer for Microsoft SharePoint 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600 customers In 40 countries GSX Solutions

More information

Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

White Paper: Intelligent BPM Architecture

White Paper: Intelligent BPM Architecture White Paper: Intelligent BPM Architecture White Paper Contents Authors: Eli Stutz, Head of Knowledge and Collaboration, PNMsoft. Tony Jetke, Enterprise Architecture Consultant and Account Manager, PNMsoft.

More information

SharePoint Benefits. Engage partners customers and employees across one platform. Internet Extranet Intranet

SharePoint Benefits. Engage partners customers and employees across one platform. Internet Extranet Intranet SharePoint Benefits Engage partners customers and employees across one platform Internet Extranet Intranet Agenda Extranet Business Optimization What is your organizational strategy? Extranet Business

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS The promise of reduced administrative costs and improved caregiver satisfaction associated with user provisioning

More information

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner: 1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information

More information

Extranet Business Goals

Extranet Business Goals Agenda Extranet Business Optimization What is your organizational strategy? Extranet Business Goals Reduce supply chain inefficiencies Interact with your loyal customer base Extend customer self service

More information

The Who, What, When, Where and Why of IAM Bob Bentley

The Who, What, When, Where and Why of IAM Bob Bentley The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages

More information

I want customers to selfservice. place orders online

I want customers to selfservice. place orders online I need to support the products and services we sell I need quoting for subscription, recurring charges and bundles I want customers to selfservice problems and place orders online I want effective product

More information

Cloud Computing. What we should be auditing

Cloud Computing. What we should be auditing Cloud Computing What we should be auditing What is cloud computing? Model Description What it does Examples SAAS Software as a service Applications often available through a browser Workday, Salesforce.com

More information

Cloud Ready Data: Speeding Your Journey to the Cloud

Cloud Ready Data: Speeding Your Journey to the Cloud Cloud Ready Data: Speeding Your Journey to the Cloud Hybrid Cloud first Born to the cloud 3 Am I part of a Cloud First organization? Am I part of a Cloud First agency? The cloud applications questions

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise

Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle NIST Definition of Cloud Computing Cloud

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Research Report on Virtualization and Cloud Computing in Test/Dev Environments

Research Report on Virtualization and Cloud Computing in Test/Dev Environments Research Report on Virtualization and Cloud Computing in Test/Dev Environments Platform Computing www.platform.com 1 Background: Methodology Objective: Examine the challenges of managing Test/Dev environments

More information

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ Delivering Cloud Services Transformation : Plan > Build> Assure> Secure Stephen Miles Vice President, Solution Sales, APJ Agenda Cloud is Great, Cloud is Good More Options, More Complexity From Outlier

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013 Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the

More information

Nyheter i SAS Data Management med SAS versjon 9.4

Nyheter i SAS Data Management med SAS versjon 9.4 make connections share ideas be inspired Nyheter i SAS Data Management med SAS versjon 9.4 Terje Vatle Nordic CoE, Data Management C o p y r i g h t 2 0 1 3, S A S I n s t i t u t e I n c. A l l r i g

More information

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions By Iranna Hurakadli and Achutha Sridhar Happiest Minds, IMSS Practice Many enterprises that have implemented

More information

Cloud and VM Based Security

Cloud and VM Based Security Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]

More information

The Principles of the Business Data Lake

The Principles of the Business Data Lake The Principles of the Business Data Lake The Business Data Lake Culture eats Strategy for Breakfast, so said Peter Drucker, elegantly making the point that the hardest thing to change in any organization

More information

Identity and Access Management for the Cloud

Identity and Access Management for the Cloud Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.

More information

Derek Burney General Manager Microsoft SharePoint Platform Microsoft Corporation

Derek Burney General Manager Microsoft SharePoint Platform Microsoft Corporation Derek Burney General Manager Microsoft SharePoint Platform Microsoft Corporation Over 2300 Attendees from over 60 countries! Nearly 4 times the size of last year s Munich SharePoint Conference! Nearly

More information

QlikView Business Discovery Platform. Algol Consulting Srl

QlikView Business Discovery Platform. Algol Consulting Srl QlikView Business Discovery Platform Algol Consulting Srl Business Discovery Applications Application vs. Platform Application Designed to help people perform an activity Platform Provides infrastructure

More information

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric

More information

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011 MICROSOFT DYNAMICS CRM Roadmap Release Preview Guide Q4 2011 Service Update Updated: August, 2011 EXECUTIVE SUMMARY Microsoft has delivered significant innovation and value in customer relationship management

More information

Company overview CUBE52. +44 (0) 118 328 2205 www.cube52.com sales@cube52.com CLOUD SERVICES

Company overview CUBE52. +44 (0) 118 328 2205 www.cube52.com sales@cube52.com CLOUD SERVICES Company overview +44 (0) 118 328 2205 www.cube52.com sales@cube52.com CUBE52 CLOUD SERVICES Modern hosting & cloud services to support your business At Cube52, our modern hosting and cloud services are

More information

Enterprise Cloud Use Cases and Security Considerations

Enterprise Cloud Use Cases and Security Considerations Enterprise Cloud Use Cases and Security Considerations Carson Sweet! CEO, CloudPassage! For This Discussion We re talking about cloud infrastructure! Cloud-oriented infrastructure delivery Infrastructure

More information