Security management solutions White paper. Extend the value of SAP investments with Tivoli security management solutions.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Security management solutions White paper. Extend the value of SAP investments with Tivoli security management solutions."

Transcription

1 Security management solutions White paper Extend the value of SAP investments with Tivoli security management solutions. December 2005

2 2 Contents 2 Introduction 3 Help protect business-critical processes through a comprehensive security infrastructure 6 Case one Financial services 6 Help maximize the security of supply chain processes 7 Help optimize the security of the PLM process 8 Case two Chemical and petroleum 8 Help strengthen authentication through TPM integration 9 SAP-certified solutions 11 At your service 12 Summary 12 For more information Introduction During the past three decades, leaders in the industrial sector have implemented SAP-based supply chain management (SCM) and product life-cycle management (PLM) systems to help manage growing product complexity, manufacturing logistics and customer demands. Bringing coherence to the diverse applications and technologies that comprise these business processes has had a transforming effect. SAP solutions have helped companies: Reconfigure supply chains based on their fluctuating needs. Slash order-processing cycles. Reduce capital investment with more efficient and accurate production and distribution plans. As the global marketplace becomes more interconnected, companies will seek to extend their SAP-based systems to suppliers and trading partners to help drive product innovation and speed time to market. These initiatives require a carefully orchestrated approach that must take into account the need to manage authorization and access control, enforce enterprise-wide security policies and facilitate compliance with expanding regulatory demands. Managing the security of SAP and enterprise systems with IBM Tivoli software can help a business establish the security and trust necessary to extend supply chain transactions to external partners without compromising agility. This white paper examines how IBM Tivoli security management solutions can help a company optimize its SAP investment by providing the security needed to integrate and extend business processes internally and externally. Specifically, this white paper discusses how comprehensive software, services and expertise from IBM can help a company in the industrial sector securely extend its business-critical enterprise applications to trading partners,

3 3 Modern applications and technology support convergence of business processes and IT leading to improved efficiency. They also increase risk. suppliers and customers and thereby help the company increase its ability to compete in an interconnected world. IBM leverages years of experience working with SAP systems and the industrial sector to help companies: Integrate comprehensive security solutions across a heterogeneous environment composed of SAP R/2, SAP R/3, SAP NetWeaver and non-sap systems. Create centralized security functionality to manage user identities and access for SAP and non-sap components. Incorporate security standards for authentication methods. Enable integration of SAP security with Web-based legacy applications. Provide access control management, centralized rules and comprehensive audit capabilities. Facilitate centralization of user management when using non-sap applications. Help protect business-critical processes through a comprehensive security infrastructure SAP components support business processes that are typically among the most critical ones. Due to the tight relationship between an SAP environment and these processes, the availability of the SAP environment is increasingly important to a business and its interconnected partners. SAP components may also be tightly integrated with other assets of the IT infrastructure both

4 4 IBM Tivoli security and identity software complements SAP internal security management. older SAP systems and more recent Web services based systems all of which must be kept highly secure and available. The challenge for newer business processes and services lies in the need to integrate older security process silos and ad hoc security solutions to create a security-rich environment for external transactions. Isolating systems from external interactions carries risks of its own: lower revenue, higher operating costs and the threat of falling behind competitors who reap the benefits of the next generation of external transactions. Nowhere is this truer than in the industrial sector. Companies in this sector depend heavily on their suppliers and trading partners to provide products and services. A large part of the industrial sector supply chain process is conducted through secure supply chain transactions on the Internet or extranet. For example, in the electronics industry, one company might design the product, which is manufactured by another company, assembled by yet another and finally distributed by a fourth company. Businesses in the automotive industry rely on suppliers for replacement and substitute parts and components. When automotive original equipment

5 5 Highlights manufacturers (OEMs) extend business processes to their suppliers, it enables them to streamline service and parts operations and provide fast service to end customers. But without a robust security mechanism in place to protect their enterprise resource planning (ERP) and PLM systems, OEMs risk exposing their intellectual property, confidential pricing and parts specifications to a significant security breach. Mergers, acquisitions and joint ventures in oil exploration are becoming more or less mandatory to contain risks and costs in the chemicals and petroleum industry. When employees can change from month to month, businesses need to be able to grant authorization to new or temporary employees quickly. By the same token, they should also be able to revoke access immediately. To succeed in this highly fragmented sector, companies need access to a security-rich environment in which they can exchange information and make transactions seamlessly across geographies to increase product innovation and speed time to market without compromising business processes or the ability to comply with regulations. IBM Tivoli security solutions for SAP can help companies protect information assets, confidentiality and data integrity to increase resilience and security of SAP environments IBM Tivoli security solutions for SAP can help companies protect information assets, confidentiality and data integrity to increase the resilience and security of SAP environments. IBM Tivoli software delivers open standards based, end-to-end solutions that integrate across the enterprise. Tivoli security solutions can help companies: Streamline user provisioning, deprovisioning and reconciliation services for internal and external users of SAP SCM and PLM applications. Address basic requirements for managing authorization and access control, as well as transmission security, in implementing NetWeaver with Web services. Segregate sensitive data and limit access to it to users with certain roles, attributes or both. Consolidate security management to provide one set of processes for the entire enterprise. Derive regulatory compliance objectives from IT process models. Take into account a number of access points, including corporate intranet, Web, remote access and mobile channels.

6 6 Financial services Overview: With more than 3,500 users accessing multiple SAP- and non-sap solutions, employee self-service and managing passwords, logins and user accounts were costly, slow and cumbersome for financial services firm FIDUCIA.* The company needed a comprehensive security management solution that would allow users to self-manage with predefined privileges and offer centralized audittrail and user-deletion capabilities. Business need: FIDUCIA wanted to eliminate manual administration and allow both the IT department and users to focus on serving customers. The company selected IBM Tivoli identity and access management tools to automate access to core systems, cutting new user account creation from days to minutes. The Tivoli solutions enable FIDUCIA to position itself as an On Demand Business, integrating internal processes more effectively and responding faster to new business demands. Solution: After consulting with IBM, FIDUCIA implemented a solution that includes: SAP R/3, including financials, human resources (HR) and payroll. mysap Customer Relationship Management (mysap CRM). SAP Business Intelligence Hardware. Tivoli Identity Manager. Tivoli Access Manager for e-business. IBM Tivoli Directory Server. Benefits: With reduced account-creation times, a full audit trail and tighter central security control, FIDUCIA has cut its administration costs; provided faster service to staff, suppliers and customers; and reduced its total cost of ownership. Help maximize the security of supply chain processes SCM processes comprise a number of functions: planning and monitoring, establishing and maintaining supplier relationships, manufacturing, logistics and transportation. Integrating and automating these functions allow a business to increase visibility across and beyond its supply chain enabling the company to identify and resolve problems in an on demand way. IBM Tivoli solutions help create the trust necessary to integrate and automate the supply chain in a security-rich manner while retaining the integrity of business-critical applications. With full support for SAP central user administration (CUA) and automation of user data, IBM Tivoli security solutions can help an organization automatically create and manage user accounts based on its role structure and data classification standards, plus apply a consistent access policy that spans crucial systems. By creating a single, reliable source of information about individual users and their access rights, IBM Tivoli Access Manager and IBM Tivoli Security Compliance Manager can help a company protect data from unauthorized access by identifying and responding automatically to security vulnerabilities. Through the robust workflow engine of IBM Tivoli Identity Manager, a business can automate the user-provisioning process, including approvals and account creation, and the user-deprovisioning process to mitigate the risk of invalid accounts and privileges. IBM Tivoli Federated Identity Manager enables a business to exchange user identification and attributed information with trusted entities that share an open standards based authentication framework to execute supply chain transactions within SAP and non-sap environments. Tivoli Federated Identity Manager reflects IBM s commitment to Web services standards and is fully compliant with all major specifications, including Liberty Alliance, Security Assertion Markup Language (SAML), WS-Federation, Web Services Security (WS-Security) and WS-Trust. IBM Tivoli solutions allow us to manage users more effectively throughout the whole group, and offer users faster access to the relevant SAP solutions. This is particularly important for human resources systems, where the integration between SAP s HR applications and Tivoli enable very easy access to all the internal systems that our employees need. Lutz Bleyer, Head of Central Security, FIDUCIA

7 7 IBM Tivoli security management solutions for SAP IBM Tivoli software maps overall security to SAP and helps provide secure identity and access management for mysap. The Tivoli security adapter family for SAP can: Provide consistent, security-rich access control to SAP resources and applications by integrating the SAP NetWeaver stack. Adding SAP integration to Tivoli Access Manager centralized access control extends SAP application with a wide range of authentication methods. Simplify creation of user accounts, automate approvals and provision user access rights by managing SAP R/3 user registry, integrating SAP User Management Engine (UME) and providing SAP HR linkage and CUA integration. Integrating SAP applications into a comprehensive identity life-cycle framework by using Tivoli Identity Manager can enhance SAP systems by providing approval workflow and full audit and reporting capabilities to SAP systems. Provide a meta-directory capability to SAP systems, real-time synchronization between identity data sources and applications transforming data between R/3 User Registry, SAP HR and other systems. IBM Tivoli Directory Integrator manages data across a variety of repositories, providing the consistent directory infrastructure (including SAP). Help optimize the security of the PLM process New products are an important part of a company s growth strategy: they attract new customers and investors, improve competitive positions and drive revenues in new markets. Inherent in these growth strategies, however, is the challenge of managing the vast resources and processes used throughout the life cycle of the product. From the initial design to implementation, everyone along the company s value chain should operate as a single enterprise. Early and frequent collaboration lets a business provide a clear understanding of the intended product characteristics and attributes to stakeholders so that

8 8 Chemical and petroleum Overview: As the holding company for the world s largest petroleum and petrochemical group, BP provides fuel for transportation, energy for heat and light, retail services and petrochemicals products for everyday items. Business need: BP needed to respond quickly to mergers and acquisitions to reduce the time required to apply security roles and permissions to the newly acquired organizations across their global enterprise. Solution: Tivoli Identity Manager helped BP automate the administration of user rights for more than 155,000 users across 15 countries, while consistently enforcing the security policy across its enterprise in an audit-friendly manner to facilitate compliance with regulations. Benefits: The project was justified after just one merger. Provisioning users went from 5 days to 10 minutes. Tivoli Identity Manager forms one of the key elements of our security services, supporting our ability to respond rapidly to change. Centralized provisioning is the only way to manage the scale and speed of our organizational change that our business growth requires. Paul Dorey, Director, Digital Business Security, BP p.l.c. the company can better align the full cost and revenue impact with business priorities. During the design process, team members can assess the impact of design changes and identify problems before they derail the project. But if the benefits are obvious, so are the risks. A company also needs to protect its intellectual property, separate sensitive information from unauthorized users and help drive the security of real-time connections between people and departments. IBM Tivoli Access Manager for e-business and IBM Tivoli Privacy Manager for e-business let organizations manage users and data access to implement and enforce privacy policies that help a company segregate access to sensitive systems such as financial information stored in SAP systems. Tivoli Identity Manager provides the functionality to provision, deprovision and reconcile internal and external user accounts through the appropriate policy and application integration agents. Tivoli Federated Identity Manager provides the integration technology to connect a remote provisioning request to Tivoli Identity Manager, which executes the appropriate policy and procedure for the task. Help strengthen authentication through TPM integration In an interconnected marketplace, employees and trading partners are often located across the globe. These employees and suppliers need fast, secure access to critical information through a variety of access points: corporate intranet, Web, remote access and mobile channels. At the same time, a company must verify the compliance of its systems with its own policies. IBM provides a comprehensive security management infrastructure with automated configuration and administration capabilities to help organizations cohesively manage users, systems and networks. If a workstation does not have the current version of virus software or the operating system security settings do not comply with corporate standards, this system will automatically assess and identify what needs to be changed and then respond with the remediation that is necessary to meet the corporate standards and polices.

9 9 Using Tivoli Access Manager for e-business and Tivoli Identity Manager, an organization can easily extend access control to desktop security solutions that rely on smart cards and Trusted Platform Modules (TPM). Tivoli Access Manager for e-business supports multiple authentication methods and access devices, including desktops, handhelds and other pervasive devices. Tivoli Identity Manager helps a company establish a centralized place to create credentials and authorizations from PKI-based cryptographic information to biometrics (electronic fingerprints). Available file and folder encryption helps save time by automatically encrypting files and helping to protect data from unauthorized access. Enhanced security for both wired and wireless networks through the Embedded Security Subsystem facilitates information access and communication while helping maintain the security of digital identities and data by requiring advanced system authentication. Tivoli security solutions also provide self-service capabilities for password resets to help reduce the number of help-desk calls, along with single sign-on capabilities to help reign in the number of passwords that can proliferate when each user has multiple accounts. SAP-certified solutions Tivoli security solutions obtained SAP interface certifications to all SAP certifiable interfaces for identity and access management. The following Tivoli products include SAP-specific functionality. Tivoli Access Manager for e-business a versatile solution for authentication and authorization problems. By integrating SAP solutions, it extends SAP security to centrally define and manage authentication, access and audit policy for a broad range of business initiatives such as employee, customer and partner portals, CRM systems, e-procurement, cross-company single sign-on projects and outsourcing projects.

10 10 Tivoli Identity Manager provides a secure, automated and policy-based user management solution that helps effectively manage user accounts, access permissions and passwords from creation to termination across all the SAP applications and the whole IT environment. By integrating SAP user administration functionality, it extends user-provisioning capabilities to the SAP landscape and extends its capabilities with a comprehensive, rolebased access-control model and approval, workflow, auditing and reporting mechanism. Tivoli Directory Server certified for the SAP BC-LDAP-USR interface, it provides a powerful Lightweight Directory Access Protocol (LDAP) identity infrastructure the foundation for deploying comprehensive identity management applications and advanced software architectures like Web services. It also provides an LDAP-based user repository for SAP systems to share with applications in heterogeneous and Internet environments. Tivoli Directory Integrator synchronizes identity data residing in directories, databases, collaborative systems, applications used for HR, CRM, ERP and other corporate applications. The connectors available for SAP integration enable external SAP applications to manage SAP users and their attributes in a similar fashion to the SAP standard user management transaction and provide support for create, read, update and delete operations for SAP R/3 HR data. Tivoli Privacy Manager for e-business protects consumer trust and brand integrity by implementing privacy policies that help guard consumers personally identifiable information. The Tivoli Privacy Manager Monitor for SAP R/3 externalizes an organization s privacy and data disclosure policy by mapping between R/3 data locations and policy types. It enables ABAP code to call out to monitor for real-time privacy authorization decision, data user access audit notification and data owner consent collection.

11 11 Highlights Based on a 30-year partnership with SAP, IBM provides hardware, software and services to complement SAP systems At your service Drawing on a 30-year partnership with SAP, IBM provides a range of hardware, software and services to complement SAP systems. Industry-proven IBM consultants can help companies secure SAP environments as they extend business processes both inside and outside their organizations. The Collaboration Technology Support Center (CTSC) is staffed by both IBM and SAP personnel to help businesses identify scenarios that deliver the greatest value for their specific business integrations. The CTSC is committed to creating significant value by combining the strengths of both product portfolios. It establishes a strong knowledge base for interoperability scenarios, implementation guidance and solution assurance through its SAPcertified security solutions. For a list of IBM certified security products, visit sap.com/softwarepartnerdir/ product/productlist.asp?letter=*&qnamesrch=%23&qkeyword= IBM%20Tivoli&qWhere=3 With broad experience and a proven track record of successful engagements, IBM Managed Security Services consultants can help a business plan, design, construct and operate a security-rich environment for its SAP applications and transactions. IBM Managed Security Services can help evaluate current security, detect misuse and violations, respond to incidents and implement changes to improve defenses. IBM Business Consulting Services helps customers gain competitive advantage, achieve tangible business results and realize return on investment by applying business processes and information technology to their business and leveraging the strong alliance and joint-development initiatives with SAP. A recipient of the SAP Award of Excellence for customer loyalty and satisfaction in every year and every geography in which it was awarded, the IBM Business Consulting Services SAP Practice helps companies worldwide implement the suite of mysap products and industry solutions. More than 8,500 highly focused professionals in 160 countries bring comprehensive industry knowledge, deep skills and years of SAP experience to all aspects of the application life cycle from strategy through operation.

12 Summary As SAP enterprise applications are integrated and extended to the Web to increase efficiencies and leverage the power of collaboration, these businesscritical assets must be kept highly available and secure. IBM provides the building blocks and infrastructure to help enhance the SAP business layer through comprehensive security solutions. With robust capabilities available to meet a wide range of security scenarios like identity management, single sign-on and compliance reporting, IBM Tivoli security solutions for SAP provide the capabilities a business needs to gain lasting value from its SAP investment: Make all customer-facing portals and applications security-rich. Help maximize the security of online collaboration efforts so design ideas and concepts can be readily shared. Facilitate compliance with government regulations. Enable a high degree of security in a way that is efficient to manage and cost-effective. Provide common identity and security services for SAP applications. Manage internal and external user identities including those in the supply chain from a single repository to help minimize costs. Help reduce the number of user IDs and passwords that SAP administrators need to maintain to help optimize application usability and the user experience. Copyright IBM Corporation 2005 IBM Corporation Software Group Route 100 Somers, NY U.S.A. Produced in the United States of America All Rights Reserved IBM, the IBM logo, the On Demand Business logo and Tivoli are trademarks of International Business Machines Corporation in the United States, other countries or both. Other company, product and service names may be trademarks or service marks of others. *ibm.com/software/success/cssdb.nsf/cs/dnsd-6gthds Each IBM customer is responsible for ensuring its own compliance with legal requirements. It is the customer s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect its business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its products or services ensure compliance with any law or regulation. Backed by 24x7, enterprise-level support and expertise, as well as a steadfast commitment to SAP, IBM is ready to help each business implement a security management strategy for its SAP-based systems today. For more information To learn more about IBM security management solutions for SAP or to find out how IBM can help you develop a security strategy to meet your unique business requirements, contact your IBM representative or IBM Business Partner, or visit ibm.com/tivoli/solutions/security To find out more about the IBM and SAP alliance, visit ibm.com/solutions/sap GC

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value. Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Security management solutions White paper. Extend business reach with a robust security infrastructure. Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution. IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities.

Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities. Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities. > RESPOND RAPIDLY TO CHANGING MARKET CONDITIONS > DRIVE CUSTOMER AND AGENT LOYALTY > ENHANCE INTEGRATION

More information

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

IBM Security & Privacy Services

IBM Security & Privacy Services Enter Click Here The challenge of identity management Today organizations are facing paradoxical demands for greater information access and more stringent information security. You must deliver more data

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

IBM Tivoli Service Request Manager

IBM Tivoli Service Request Manager Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Innovate automotive design and improve productivity, sales and services to grow and reach new markets.

Innovate automotive design and improve productivity, sales and services to grow and reach new markets. Software for the automotive industry Executive brief Innovate automotive design and improve productivity, sales and services to grow and reach new markets. 2 Innovate automotive design and improve productivity,

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/

More information

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Privileged Identity Manager helps prevent insider threats IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged

More information

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

Security solutions White paper. Succeeding with automated identity management implementations.

Security solutions White paper. Succeeding with automated identity management implementations. Security solutions White paper Succeeding with automated identity management implementations. March 2007 2 Contents 2 Overview 2 Understand how Tivoli Identity Manager addresses security challenges 4 Requirements

More information

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction

More information

Address IT costs and streamline operations with IBM service request and asset management solutions.

Address IT costs and streamline operations with IBM service request and asset management solutions. Service management solutions To support your IT objectives Address IT costs and streamline operations with IBM service request and asset management solutions. Highlights Help service desk technicians become

More information

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments. Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Cisco Security Services

Cisco Security Services Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

ROUTES TO VALUE. Business Service Management: How fast can you get there?

ROUTES TO VALUE. Business Service Management: How fast can you get there? ROUTES TO VALUE Business Service : How fast can you get there? BMC Software helps you achieve business value quickly Each Route to Value offers a straightforward entry point to BSM; a way to quickly synchronize

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY

ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY ENTERPRISE MANAGEMENT AND SUPPORT IN THE TELECOMMUNICATIONS INDUSTRY The Telecommunications Industry Companies in the telecommunications industry face a number of challenges as market saturation, slow

More information

Solving SAP Application Access and Security Challenges with an Identity-Infused Enterprise

Solving SAP Application Access and Security Challenges with an Identity-Infused Enterprise Solving SAP Application Access and Security Challenges with an Identity-Infused Enterprise Contents Introduction. 1 The Challenge of Providing Secure Access to SAP Applications 2 The Advantages of Operating

More information

IBM Global Services IBM Security and Privacy Services. Guiding you toward secure e-business.

IBM Global Services IBM Security and Privacy Services. Guiding you toward secure e-business. IBM Global Services IBM Security and Privacy Services Guiding you toward secure e-business. Capitalize on opportunity and safeguard your business Increasing use of the Internet offers fundamental business

More information

Eliminate Security Risks

Eliminate Security Risks Eliminate Security Risks A NOVELL NSURE SOLUTIONS BUSINESS WHITE PAPER www.novell.com Table of Contents Eliminate Security Risks 2 ACHIEVING AGILITY WITHOUT COMPROMISING SECURITY 3 THE PROBLEM: PASSWORD

More information

Collaboration solutions for midsized businesses Buyer s guide

Collaboration solutions for midsized businesses Buyer s guide Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources

More information

Minimize Access Risk and Prevent Fraud With SAP Access Control

Minimize Access Risk and Prevent Fraud With SAP Access Control SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

Services for the CFO Financial Management Consulting

Services for the CFO Financial Management Consulting IBM Global Business Services Services for the CFO Financial Management Consulting Financial Management Chief financial officers (CFOs) are currently in a highly visible, highly influential position. They

More information

IBM content management solutions deliver a return on all of your information.

IBM content management solutions deliver a return on all of your information. IBM Content Management Manage, share, protect and deliver information on demand IBM content management solutions deliver a return on all of your information. Innovative offerings enhance customer satisfaction,

More information

Modernizing enterprise application development with integrated change, build and release management.

Modernizing enterprise application development with integrated change, build and release management. Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.

More information

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

When millions need access: Identity management in an increasingly connected world

When millions need access: Identity management in an increasingly connected world IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers

More information

IBM Tivoli Asset Management for IT

IBM Tivoli Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related

More information

IBM Maximo technology for business and IT agility

IBM Maximo technology for business and IT agility IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary

More information

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution Smart SOA application integration with WebSphere software To support your business objectives Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment

More information

SAP NetWeaver. SAP NetWeaver

SAP NetWeaver. SAP NetWeaver SAP NetWeaver SAP NetWeaver POWERED BY SAP NetWeaver The SAP NetWeaver technology platform is a comprehensive integration and application platform that helps reduce your total cost of ownership (TCO).

More information

Select the right solution for identity and access governance

Select the right solution for identity and access governance IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

Gain a competitive edge through optimized B2B file transfer

Gain a competitive edge through optimized B2B file transfer Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2

More information

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM Rational AppScan: enhancing Web application security and regulatory compliance. Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your

More information

Information technology infrastructure key to your business success.

Information technology infrastructure key to your business success. IBM Global Services Information technology infrastructure key to your business success. In today s complex business environment, new opportunities constantly emerge, which can challenge a company s ability

More information

Enhance visibility into and control over software projects IBM Rational change and release management software

Enhance visibility into and control over software projects IBM Rational change and release management software Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

Improve business agility with WebSphere Message Broker

Improve business agility with WebSphere Message Broker Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching

More information

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December

More information

Supply Chain Management Build Connections

Supply Chain Management Build Connections Build Connections Enabling a business in manufacturing Building High-Value Connections with Partners and Suppliers Build Connections Is your supply chain responsive, adaptive, agile, and efficient? How

More information

Additionally, as a publicly traded company, there are regulatory compliance motivations.

Additionally, as a publicly traded company, there are regulatory compliance motivations. Case Study Retail Industry Sage, TIM & TAM Author: Mark Funk, Trinity Solutions Senior Tivoli Consultant, with over 25 years of extensive experience in the Information Technology Industry with a excellent

More information

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool network management solutions for enterprise IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals

More information

Reaping the rewards of your serviceoriented architecture infrastructure

Reaping the rewards of your serviceoriented architecture infrastructure IBM Global Services September 2008 Reaping the rewards of your serviceoriented architecture infrastructure How real-life organizations are adding up the cost savings and benefits Executive summary Growing

More information

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011 NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them.

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. imprivata OneSign The Converged Authentication and Access Management Platform The

More information

Securing the Cloud through Comprehensive Identity Management Solution

Securing the Cloud through Comprehensive Identity Management Solution Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style

More information

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA

More information

Automated User Provisioning

Automated User Provisioning Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110

More information

Select the right configuration management database to establish a platform for effective service management.

Select the right configuration management database to establish a platform for effective service management. Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely

More information

The IBM Solution Architecture for Energy and Utilities Framework

The IBM Solution Architecture for Energy and Utilities Framework IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

IBM Software Integrated Service Management: Visibility. Control. Automation.

IBM Software Integrated Service Management: Visibility. Control. Automation. IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming

More information

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

IBM Global Business Services Microsoft Dynamics AX solutions from IBM IBM Global Business Services Microsoft Dynamics AX solutions from IBM Powerful, agile and simple enterprise resource planning 2 Microsoft Dynamics AX solutions from IBM Highlights Improve productivity

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

IBM Maximo Asset Management for IT

IBM Maximo Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software

More information

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

The Accenture/ Siemens PLM Software Alliance

The Accenture/ Siemens PLM Software Alliance The Accenture/ Siemens PLM Software Alliance Enabling Efficient Product Lifecycle Management Companies in a wide range of industries rely upon Product Lifecycle Management (PLM) to grow their business,

More information

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business

More information

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

Avoiding insider threats to enterprise security

Avoiding insider threats to enterprise security IBM Software Thought Leadership White Paper October 2012 Avoiding insider threats to enterprise security Protect privileged user identities across complex IT environments even in the cloud 2 Avoiding insider

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Effective storage management and data protection for cloud computing

Effective storage management and data protection for cloud computing IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage

More information

Empowering intelligent utility networks with visibility and control

Empowering intelligent utility networks with visibility and control IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering

More information

IT & Management Consulting Services

IT & Management Consulting Services 2008 Microsoft Corporation. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Excel, Microsoft Dynamics,

More information

Optimizing government and insurance claims management with IBM Case Manager

Optimizing government and insurance claims management with IBM Case Manager Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights

More information

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data

More information

IBM Tivoli Netcool network management solutions for SMB

IBM Tivoli Netcool network management solutions for SMB IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Maximizing Cross-Platform Application Availability

Maximizing Cross-Platform Application Availability June 2005 Maximizing Cross-Platform Application Availability Robert Kennedy, SCM Product Manager Karen Wade, SCM Product Marketing Manager Page 2 Contents 2 The challenges of change in complex computing

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information