Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Size: px
Start display at page:

Download "Establishing a Mature Identity and Access Management Program for a Financial Services Provider"

Transcription

1 Customer Success Stories TEKsystems Global Services Establishing a Mature Identity and Access Management Program for a Financial Services Provider FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES INFORMATION SECURITY

2 Executive Summary A financial services provider partnered with TEKsystems to build a secure identity and access management (IAM) program to address regulatory audit findings and improve the end-user experience. Quick Facts Client Industry: Financial services Revenue: More than $165 million Geographic Presence: Has a presence in the Midwest with offices across the country Objectives Educate client that IAM is not just an IT or information security issue; rather it s a business issue that requires a formal IAM program to address business challenges and implement organizational change Create a customized IAM roadmap to address audit findings and enhance the user experience Build a program to advance the client s IAM maturity and enhance security Assess the client s existing IAM processes and procedures to identify opportunities to reduce audit findings, and improve and streamline processes Identify IAM tool business requirements and aid the client in reviewing off-the-shelf IAM software suites to assist with vendor selection Results Created a comprehensive, three-year roadmap to establish and build a robust IAM program and guide all future IAM initiatives and module implementations Facilitated the client s selection of a new identity governance and administration product based on functionality and features Outlined future program components, including streamlining access reviews and access requests, integrating policy monitoring, establishing baseline metrics for comparative analysis to track program improvements, and implementing self-service password functionalities Technologies Supported Identity governance and administration Identity and access governance User administration and provisioning Challenges Coordinate with a third-party IAM software vendor to install and implement the client s new IAM tool Adjust the IAM roadmap as necessary to reflect the client s changing business priorities Demonstrate the value of an enhanced IAM program to stakeholders in the absence of baseline metrics TEKsystems Global Services Customer Success Stories TEKsystems.com 2

3 Client Profile The client, recently designated as systemically important to the U.S. financial market, is the world s leading equity derivatives clearing organization. The corporation clears a wide array of diverse and sophisticated products. Offering clearing and settlement services for transactions in futures and options, the client also clears transactions for security futures, over-thecounter and exchange-listed options. Industry Landscape Due to the highly sensitive nature of finance and its associated data and policies, the financial services industry is heavily regulated to protect consumer and institutional assets. Overarching regulations and industry mandates are constantly changing in response to evolving threats and industry needs; businesses must address emerging security issues or face severe consequences. Leaving security and access issues unresolved can result in auditrelated fines, shaken investor confidence, a tarnished brand perception and heightened security risks. In addition to managing security issues associated with external threats, organizations must protect their assets internally as well. It is important that organizations give internal and external identities including contractors, vendors and business partners the appropriate level of access to information, applications and networks needed to complete their responsibilities. However, privilege levels can vary widely depending on an identity s job function, seniority or specific projects. Maintaining diverse access privileges for thousands of identities can be a daunting task as individuals are onboarded or offboarded on a regular basis. Organizations must have a scalable IAM program and IAM systems in place to ensure proper clearances or privileges can be quickly updated to reflect business and regulatory changes. Organizations often rely on IAM programs backed by sound governance policies to ensure compliance and streamline user account management and maintenance via automated policies and processes. A robust IAM program can help establish and enforce repeatable business processes, and the underlying infrastructure service components needed to create and maintain accurate and timely user identities that dictate access privileges and restrictions. A secure program can also improve business efficiencies by minimizing the need for help desk support and allowing identities to be self-sufficient in resolving issues. Companies must find the right balance between restricting access to information necessary to safeguard the business while granting internal and external identities the appropriate access needed to be productive and profitable. TEKsystems Global Services Customer Success Stories TEKsystems.com 3

4 Situation The client, a financial services provider, operates under direct oversight of the U.S. Securities and Exchange Commission (SEC) and U.S. Commodity Futures Trading Commission (CFTC). The client is regularly audited by these organizations to ensure it complies with the most recent regulatory and security mandates that govern the financial marketplace. During a recent audit, the client was found to be lacking in numerous IAM standards needed to help protect sensitive business assets and mitigate security risks for the organization and its end users. Among the findings were: The presence of idle accounts. The client s system contained numerous orphan accounts belonging to past or terminated identities, which meant timely account decommissioning was not consistently occurring. Inadequate access verification. It was difficult for the auditors to confirm why certain accounts had the access they did within the system. The approval process to access applications and systems was inconsistently applied. Inadequate access reviews. The client did not conduct periodic access reviews across all key applications/ systems to ensure the appropriate levels of access were provided to the correct individuals as their roles or seniority changed. Inadequate controls around privileged account management. The client lacked policies and procedures to manage super-user accounts (e.g., administrator, root and emergency identities). Due to the highly regulated nature of the client s business and the extensive regulatory audit findings that had been identified, a formal IAM program backed by a sophisticated IAM tool was needed for the client to remain in good standing with the SEC and CFTC, and most importantly, remain operational. A sound IAM program would help ensure the proper privileges and access credentials were associated with the correct internal/external personnel and business partners to help fortify the client s operations and data management. Previously, the client had relied on internal security analysts to oversee the manual creation, maintenance and decommissioning of user accounts within the computing environment, which left room for errors or oversights in regard to account maintenance and management. Additionally, while the client had a legacy IAM tool in place to aid in password synchronizations across internal directories, other functionalities had never been implemented, so the full benefits of the tool were never utilized. A sound IAM program would help ensure the proper privileges and access credentials were associated with the correct internal/ external personnel and business partners to help fortify the client s operations and data management. TEKsystems Global Services Customer Success Stories TEKsystems.com 4

5 The client sought a trusted IAM advisor to guide them in building and implementing a secure IAM program to address their IAM audit findings. The client also wanted a partner that could assist them in selecting an off-the-shelf IAM software product to replace the existing legacy tool responsible for password synchronization. A formalized IAM program backed by versatile IAM software would automate user account functions, help eliminate user maintenance errors, improve overall organizational efficiencies, and better protect the business from potential security threats and future audit issues. Solution Having previously partnered with TEKsystems Global Services on a variety of projects, the client was aware of our dedicated Information Security Services practice and IAM expertise. The client s director of security operations / security services met with practice leaders to discuss their IAM challenges and see how TEKsystems could help mitigate the challenges they faced. After hearing our proposed solution, and based on their confidence in our ability to deliver a mature IAM program, the client promptly selected TEKsystems without needing to consider alternate vendors. Our solution consisted of three sequential components: 1. Mapping Regulatory IAM Audit Findings To gain a better understanding of the client s existing IAM processes and procedures, we would complete a thorough assessment of the regulatory audit findings. As part of this assessment, we would evaluate which findings could be addressed by an IAM tool and identify how an implemented tool would mitigate the security issues associated with each finding. 2. Building the IAM Roadmap We would prepare a three-year IAM roadmap to establish and build a mature IAM program and to provide a framework to implement the selected IAM tool. The roadmap would detail future-state IAM projects, including centralizing access requests, enforcing consistent approval processes, automating manual access reviews and defining separation of duties (SoD) policy monitoring, which would aid in proactively avoiding audit violations and enhancing identity monitoring and maintenance. The roadmap would also outline initiatives to help improve the user experience. For example, we recommended that numerous and disparate access request portals be centralized in one system to minimize user confusion. In addition, implementing selfservice capabilities would provide strategic business value to not only the client s business but its end users. We would also review, define and update organizational policies and procedures to build a new identity governance foundation to guide all future IAM projects. 3. Selecting an IAM Tool We would evaluate the functionality and features of commercially available IAM software solutions to determine the best identity governance and administration product for the client. The new IAM tool would replace manual, error-prone tasks associated with creating and maintaining user accounts. It also would replace the client s existing legacy tool responsible for synchronizing passwords between internal directories. TEKsystems Global Services Customer Success Stories TEKsystems.com 5

6 Results Based on our assessment of the SEC s and CFTC s audit findings, we designed a comprehensive roadmap to guide the client in building a secure and robust IAM program. The custom, multiphased roadmap outlined ways to address and correct audit findings, including issues with access requests and access reviews, the cleanup of idle accounts and password management. Additionally, the roadmap provided ways to enhance the user experience and streamline IAM processes and procedures outside of issues noted in the audit findings. The custom, multiphased roadmap outlined ways to address and correct audit findings, including issues with access requests and access reviews, the cleanup of idle accounts and password management. Choosing a new IAM software suite to support roadmap initiatives and address audit findings was a critical component of our IAM solution. We outlined governance parameters under which the new IAM tool would operate specifically defining and reviewing associated IAM business requirements and functionalities. We then identified key components and features an ideal IAM tool would have, and researched relevant identity governance and administration products available in the market. We assisted the client in meeting with software vendors to review products and compare functionality against our identified requirements. Based on these meetings, the client selected a new, robust tool. Phase two of our solution involved implementing the new IAM tool. We assisted the client with defining business requirements and oversaw the installation and configuration of the tool as the client s IAM subject matter expert. We then thoroughly tested the solution to ensure it complied with the client s stated business requirements. The new IAM tool had a wide array of modules to centralize disparate IAM functions, including modules to govern access reviews and access requests, policy monitoring, and role management, among other core IAM functionalities. After the software was installed, configured and thoroughly tested, the client was able to utilize the tool to perform password synchronization and decommission their previous IAM tool. The next phases of our solution will be implemented over the next several years in accordance with IAM initiatives outlined in the roadmap. While the original roadmap we prepared was based on three years, the nature of the client s business dictated that numerous stakeholders were involved in key business decisions, which lengthened the time it took to implement major organizational changes. To accommodate this reality, we adjusted the timeline to more accurately align with the client s pace of implementation. The revised roadmap will be rolled out over the next three to five years. TEKsystems Global Services Customer Success Stories TEKsystems.com 6

7 A key priority addressed in our roadmap was improving the client s access review process. We recommended using the IAM tool to automate and streamline the process, incorporating business-friendly entitlement descriptions, so the appropriate certifiers would be alerted via and given the ability to evaluate access from a centralized Web portal. In addition to strengthening the access review process, we delivered a plan to establish sophisticated policy monitoring to better coordinate the decommissioning of user accounts and proactively reduce risks for future audits. Previously, changes to user accounts were sporadically reviewed, and generally inconsistencies or errors were only caught during an audit. Under the new module, policy violations will be flagged within the system in real time so any changes to user accounts can be implemented within days as opposed to months. To help enhance the overall user experience, we recommended implementing several self-service features, including self-service password reset. The new module will give users the ability to answer security questions to independently reset their passwords / unlock their accounts. This functionality would help reduce the number of passwordrelated calls to the help desk and improve end-user satisfaction. We also recommended the client begin tracking IAM baselines so that as each new tool module is implemented, the director of security operations / security services would have evidence to show executive management a decrease in IAM audit findings, process improvements and cost reductions to justify the continued spend on the IAM program. TEKsystems will support the client s IAM program development over the next several years. Future roadmap components will continue to address existing audit findings, proactively avoid future IAM issues, mature the client s IAM program and strengthen the overall security of the business. Key Success Factors IAM expertise With a dedicated Information Security Services practice, we were able to provide the client with a comprehensive roadmap specific to their unique needs. Our seasoned practice professionals have more than a decade of experience in their field, which allowed them to draw on a wide breadth of past experiences and know which strategies really work. We made suggestions on ways to improve efficiencies, address audit findings and centralize many of the previously disparate IAM functionalities within the organization. Flexibility Aside from being a highly regulated financial services provider, the client is a private, nonprofit organization, which meant making weighty organizational decisions could be a lengthy process. Though our roadmap was originally positioned to take three years to implement, we evolved our solution to fit a more realistic timeline of five years given the conditions within the client. We also were flexible in working within the client s timeline and coordinating the new IAM tool s implementation in conjunction with the third-party software vendor. TEKsystems Global Services Customer Success Stories TEKsystems.com 7

8 Trusting relationship The client s preexisting relationship with TEKsystems helped solidify this engagement. The client was confident in our abilities based on past TEKsystems Global Services projects, including in areas of applications management outsourcing and quality assurance and testing. Based on this relationship, the client felt they didn t need to go through a formal RFP process prior to selecting TEKsystems to drive the formation of their IAM program. About TEKsystems People are at the heart of every successful business initiative. At TEKsystems, we understand people. Every year we deploy over 80,000 IT professionals at 6,000 client sites across North America, Europe and Asia. Our deep insights into IT human capital management enable us to help our clients achieve their business goals while optimizing their IT workforce strategies. We provide IT staffing solutions, IT talent management expertise and IT services to help our clients plan, build and run their critical business initiatives. Through our range of quality-focused delivery models, we meet our clients where they are, and take them where they want to go, the way they want to get there. Visit us online at TEKsystems.com TEKsystems Global Services Customer Success Stories TEKsystems.com 8

QUICK FACTS. Guiding the Identity and Access Management Strategy for Yale New Haven Health System TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Guiding the Identity and Access Management Strategy for Yale New Haven Health System TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Healthcare Services, Network Infrastructure Services Information Security ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Healthcare Revenue: $3.3 billion Employees: 18,000

More information

TEKsystems: Consolidating Two Industries, A Case Study

TEKsystems: Consolidating Two Industries, A Case Study [ Manufacturing, Network Infrastructure Services Technology Deployment ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Packaging manufacturing Revenue: Over $9 billion Employees:

More information

QUICK FACTS. Managing a Service Operations Team for a Leading Software Developer. TEKsystems Global Services Customer Success Stories.

QUICK FACTS. Managing a Service Operations Team for a Leading Software Developer. TEKsystems Global Services Customer Success Stories. Providing an IT Education Business Processing [ Information Technology, Applications Management ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Software Revenue: $74.3 billion

More information

Designing and Implementing IT Infrastructure Standardization for a Large Energy Company

Designing and Implementing IT Infrastructure Standardization for a Large Energy Company Customer Success Stories TEKsystems Global Services Designing and Implementing IT Infrastructure Standardization for a Large Energy Company ENERGY SERVICES NETWORK INFRASTRUCTURE SERVICES TECHNOLOGY DEPLOYMENT

More information

Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery

Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery Customer Success Stories TEKsystems Global Services Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery COMMUNICATIONS AGILE TRANSFORMATION SERVICES Executive Summary

More information

Creating Customized Training for a Leading Insurance Company

Creating Customized Training for a Leading Insurance Company Customer Success Stories TEKsystems Global Services Creating Customized Training for a Leading Insurance Company FINANCIAL SERVICES TRAINING AND EDUCATION SERVICES Executive Summary A Fortune 50 insurance

More information

QUICK FACTS. Mitigating Co-employment Risk for a Global Interactive Entertainment Company TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Mitigating Co-employment Risk for a Global Interactive Entertainment Company TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Information Technology, Managed Services Offering ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES QUICK FACTS Client Profile Industry: Media, entertainment and gaming Revenue: More than $4 billion

More information

Facilitating a Windows 7 Upgrade and Application Packaging for a Major U.S. Bank

Facilitating a Windows 7 Upgrade and Application Packaging for a Major U.S. Bank Customer Success Stories TEKsystems Financial Services Facilitating a Windows 7 Upgrade and Application Packaging for a Major U.S. Bank FINANCIAL SERVICES NETWORK INFRASTRUCTURE SERVICES TECHNOLOGY DEPLOYMENT

More information

QUICK FACTS. Modernizing a Retailer s Point-of-Sale System from Off Shore. TEKsystems Global Services Customer Success Stories.

QUICK FACTS. Modernizing a Retailer s Point-of-Sale System from Off Shore. TEKsystems Global Services Customer Success Stories. [ Retail, Application Management Outsourcing ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Retail Revenue: Approximately $19 billion Employees: 30,000 Geographic Presence:

More information

QUICK FACTS. Replicating Canada-based Database Support at a New Facility in the U.S. TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Replicating Canada-based Database Support at a New Facility in the U.S. TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Energy Services, Managed Services Offering/ Network Infrastructure Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Oil and natural gas Revenue: Approximately $5.2

More information

QUICK FACTS. Delivering Superior IT Support Services for a Video Game Maker TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Delivering Superior IT Support Services for a Video Game Maker TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Information Technology, Network Infrastructure Services Support Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES QUICK FACTS Client Profile Industry: Video and consumer entertainment Revenue:

More information

How To Improve Service Transition

How To Improve Service Transition [ Financial Services, Application Management Outsourcing ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Insurance Revenue: $64.3 billion Employees: Over 65,000 Geographic

More information

QUICK FACTS. Facilitating Application Packaging on Behalf of a Global Professional Services Company

QUICK FACTS. Facilitating Application Packaging on Behalf of a Global Professional Services Company [ Professional Services, Technology Deployment ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Professional Services Revenue: Over $13 billion Employees: Over 250,000 Geographic

More information

QUICK FACTS. Implementing Business Intelligence and Retail Signal Solutions for Sony PlayStation TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Implementing Business Intelligence and Retail Signal Solutions for Sony PlayStation TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Manufacturing, Data Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Video and computer entertainment Global Revenue: $77.58 billion Employees: More than 162,000

More information

E-fficient Project Management and Execution

E-fficient Project Management and Execution [ Healthcare, Technology Deployment ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Healthcare Revenue: More than $10 billion Employees: Approximately 6,900 Geographic Presence:

More information

QUICK FACTS. Consolidating Service Desks Post-Merger for a Leading U.S. Energy Supplier TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Consolidating Service Desks Post-Merger for a Leading U.S. Energy Supplier TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Energy Services, Managed Services Offering/IT Support Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Energy Revenue: $23.5 billion Employees: Approximately 26,000

More information

QUICK FACTS. Providing a Unified Communications Training Solution to End Users Across North America

QUICK FACTS. Providing a Unified Communications Training Solution to End Users Across North America [ Financial Services, Training and Education Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES QUICK FACTS Client Profile Industry: Insurance Revenue: $64.3 billion Employees: Over 65,000

More information

Managing a 24x7x365 Support Center and Network Engineering for a Government Agency QUICK FACTS

Managing a 24x7x365 Support Center and Network Engineering for a Government Agency QUICK FACTS [ Government, Managed Services Offering, Network Infrastructure Services Support Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Government Employees: More than

More information

QUICK FACTS. Enhancing the Marketing Campaign Management Portal for an SaaS Provider. TEKsystems Global Services Customer Success Stories

QUICK FACTS. Enhancing the Marketing Campaign Management Portal for an SaaS Provider. TEKsystems Global Services Customer Success Stories [ Information Technology, Application Development ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Internet and software services Revenue: Over $200 million Employees: Nearly

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

QUICK FACTS. Implementing Oracle Business Intelligence Applications 11g for a Fortune 500 Corporation

QUICK FACTS. Implementing Oracle Business Intelligence Applications 11g for a Fortune 500 Corporation [ Manufacturing, Analytics Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Appliances manufacturing Revenue: $146 billion (parent company) Employees: 305,000 (parent

More information

QUICK FACTS. Transitioning On-Site Support to an Off-Shore Model on Behalf of an Insurance Provider

QUICK FACTS. Transitioning On-Site Support to an Off-Shore Model on Behalf of an Insurance Provider [ Financial Services, Application Development and Management ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES QUICK FACTS Client Profile Industry: Insurance Revenue: More than $68 billion Employees:

More information

QUICK FACTS. Establishing a Telephony Service Desk System to Enhance Telecommunications Support. TEKsystems Global Services Customer Success Stories

QUICK FACTS. Establishing a Telephony Service Desk System to Enhance Telecommunications Support. TEKsystems Global Services Customer Success Stories [ Retail, Support Services ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Retail Revenue: $50.7 billion Employees: Approximately 167,000 Geographic Presence: Headquartered

More information

AGILE SOFTWARE TESTING

AGILE SOFTWARE TESTING AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software

More information

Simply Sophisticated. Information Security and Compliance

Simply Sophisticated. Information Security and Compliance Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns

More information

Modernizing H-E-B s Point-of-sale Systems

Modernizing H-E-B s Point-of-sale Systems Customer Success Stories TEKsystems Global Services Modernizing H-E-B s Point-of-sale Systems RETAIL NETWORK INFRASTRUCTURE SERVICES TECHNOLOGY DEPLOYMENT Executive Summary H-E-B engaged TEKsystems to

More information

BRAVE NEW WORLD: OVERCOMING NEW HEALTHCARE CHALLENGES WITH TOP IT TALENT

BRAVE NEW WORLD: OVERCOMING NEW HEALTHCARE CHALLENGES WITH TOP IT TALENT HEALTHCARE CHALLENGES WITH TOP IT TALENT Massive change is on the horizon for your healthcare organization in fact, it has probably already started. For years, industry organizations have departmentalized

More information

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential

More information

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value. Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user

More information

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud Terrorist Sabotage Theft Credit Card Fraud Theft Corporate Malfeasance HCL Information Security Practice Why to go for IAM? Terrorist sabotage. theft. Credit card fraud. Corporate malfeasance. Privacy

More information

CUSTOMER SUCCESS STORIES

CUSTOMER SUCCESS STORIES [ Applications Development, MSO ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Financial Services Client Revenue: The parent company holds more than $340 billion in assets

More information

QUICK FACTS. Catholic Health Initiatives Collaborates with TEKsystems to Update its Aging Fleet of IT Equipment to Achieve Meaningful Use

QUICK FACTS. Catholic Health Initiatives Collaborates with TEKsystems to Update its Aging Fleet of IT Equipment to Achieve Meaningful Use [ Healthcare, Technology Deployment ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Healthcare Revenue: Approximately $9.8 billion (FY2012) Employees: Approximately 78,000

More information

Customizing Identity Management to fit complex ecosystems

Customizing Identity Management to fit complex ecosystems Customizing Identity Management to fit complex ecosystems Advisory Services PwC Security - Identity Management 12 July 2011 Client s challenge One of the world s largest aerospace and defense corporations

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

AD Management Survey: Reveals Security as Key Challenge

AD Management Survey: Reveals Security as Key Challenge Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active

More information

QUICK FACTS. Providing Application Development and Data Migration Support for a Leading Healthcare Company

QUICK FACTS. Providing Application Development and Data Migration Support for a Leading Healthcare Company [ Healthcare Services, Application Development ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Healthcare Revenue: Private Employees: Over 400 Geographic Presence: Locations

More information

QUICK FACTS. Providing an Infrastructure Managed Services Solution for a Telecommunications Provider

QUICK FACTS. Providing an Infrastructure Managed Services Solution for a Telecommunications Provider Providing an IT Education Business Processing [ Communications, Infrastructure ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Telecommunications Revenue: $124 billion, consolidated

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

QUICK FACTS. Optimizing Procurement and Invoicing Processes on Behalf of a Financial Services Firm TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Optimizing Procurement and Invoicing Processes on Behalf of a Financial Services Firm TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Financial Services, Data Services] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Financial Services Revenue: Nearly $2 billion Employees: Approximately 3,000 Geographic

More information

Point of View: FINANCIAL SERVICES DELIVERING BUSINESS VALUE THROUGH ENTERPRISE DATA MANAGEMENT

Point of View: FINANCIAL SERVICES DELIVERING BUSINESS VALUE THROUGH ENTERPRISE DATA MANAGEMENT Point of View: FINANCIAL SERVICES DELIVERING BUSINESS VALUE THROUGH ENTERPRISE DATA MANAGEMENT THROUGH ENTERPRISE DATA MANAGEMENT IN THIS POINT OF VIEW: PAGE INTRODUCTION: A NEW PATH TO DATA ACCURACY AND

More information

Designing a Customized E-learning Solution for a Worldwide IT Company

Designing a Customized E-learning Solution for a Worldwide IT Company Customer Success Stories TEKsystems Global Services Designing a Customized E-learning Solution for a Worldwide IT Company INFORMATION TECHNOLOGY TRAINING AND EDUCATION SERVICES Executive Summary TEKsystems

More information

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Building a Roadmap to Robust Identity and Access Management

Building a Roadmap to Robust Identity and Access Management Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information

BUYER S GUIDE. Identity Management and Governance

BUYER S GUIDE. Identity Management and Governance BUYER S GUIDE Identity Management and Governance 2 BUYER S GUIDE: IDENTITY MANAGEMENT AND GOVERNANCE Overview For those charged with selecting all or part of their organization s Identity Management and

More information

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan Identity & Access Management Case Study & Lessons Learned Prepared by Tariq Jan Investment Bank Case Study Top 5 leading global financial services firm $116 billion in revenue $2 trillion in assets 220k

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

solution brief NEC Remote Managed Services Prevent Costly Communications Downtime with Proactive Network Monitoring and Management from NEC

solution brief NEC Remote Managed Services Prevent Costly Communications Downtime with Proactive Network Monitoring and Management from NEC NEC Remote Managed Services Prevent Costly Communications Downtime with Proactive Network Monitoring and Management from NEC NEC Remote Managed Services: Removing the Complexities of Communications Network

More information

Insurance Industry Expertise

Insurance Industry Expertise Insurance Industry Expertise Delivered With High-Level Attention and Service Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four For more than 50 years, clients in all sectors of

More information

PRACTICAL BUSINESS INTELLIGENCE STRATEGIES:

PRACTICAL BUSINESS INTELLIGENCE STRATEGIES: PRACTICAL BUSINESS INTELLIGENCE STRATEGIES: Strong BI Foundations to Fuel Your Business Success. Companies that stand out from the crowd have learned the importance of leveraging information to make the

More information

Seven Rules of Thumb for Post-Trade Compliance

Seven Rules of Thumb for Post-Trade Compliance A Confluence Whitepaper Seven Rules of Thumb for Post-Trade Compliance What Fund Administrators Need to Know A growing body of regulations governing investment portfolio management has expanded both the

More information

June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers

June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers John Keel, CPA State Auditor An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers Report No. 08-038 An Audit Report on The Department of Information

More information

Identity and Access Management Point of View

Identity and Access Management Point of View Identity and Access Management Point of View Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation

More information

IT WORKFORCE PERSPECTIVES

IT WORKFORCE PERSPECTIVES IT WORKFORCE PERSPECTIVES To optimize how organizations attract, develop and retain great IT people, it is critical to evaluate what happens at the line levels of IT and how organizations source, screen,

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

Identity Management Capabilities Rise in the Cloud

Identity Management Capabilities Rise in the Cloud Fischer International Identity Identity Management Made for Higher Education IDENTITY MANAGEMENT CASE STUDY Identity Management Capabilities Rise in the Cloud Maryland Institute College of Art Executive

More information

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management improving SAP security with CA Identity and Access Management The CA Identity and Access Management (IAM) suite can help you

More information

QUICK FACTS. Implementing a Big Data Solution on Behalf of a Media House TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Implementing a Big Data Solution on Behalf of a Media House TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Communications, Services ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile (parent company) Industry: Media, broadcasting and entertainment Revenue: Approximately $28 billion Employees:

More information

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing 1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Identity and Access Needs

More information

BUYER S GUIDE. Identity Management and Governance

BUYER S GUIDE. Identity Management and Governance BUYER S GUIDE Identity Management and Governance 2 BUYER S GUIDE: IDENTITY MANAGEMENT AND GOVERNANCE Overview For those charged with selecting all or part of their organization s identity management and

More information

SURVEY FINDINGS. Executive Summary. Introduction Budgets and Spending Salaries and Skills Areas of Impact Workforce Expectations

SURVEY FINDINGS. Executive Summary. Introduction Budgets and Spending Salaries and Skills Areas of Impact Workforce Expectations SURVEY FINDINGS TEKsystems Annual IT Forecast 2015 Executive Summary More than 500 IT leaders (CIOs, IT VPs, IT directors and IT hiring managers) were polled on the current state of IT spending, skills

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

CA Enterprise Mobility Management MSO

CA Enterprise Mobility Management MSO SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.

More information

Day One Employee Productivity and Increased Security: Integrated Provisioning and SSO

Day One Employee Productivity and Increased Security: Integrated Provisioning and SSO Day One Employee Productivity and Increased Security: Integrated Provisioning and SSO Introduction The pressure to increase productivity among end-users and IT administrators alike is an ongoing challenge

More information

The Role of Password Management in Achieving Compliance

The Role of Password Management in Achieving Compliance White Paper The Role of Password Management in Achieving Compliance PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail: sales@portalguard.com Website: www.portalguard.com

More information

The Role of Internal Audit in Risk Governance

The Role of Internal Audit in Risk Governance The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Department of Information Technology

Department of Information Technology Lines of Business LOB #132: END USER SERVICES Department of Information Technology Purpose The End User Services LOB in the Department of Information Technology is responsible for providing direct technical

More information

Automated User Provisioning

Automated User Provisioning Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110

More information

Successful Outsourcing of Data Warehouse Support

Successful Outsourcing of Data Warehouse Support Experience the commitment viewpoint Successful Outsourcing of Data Warehouse Support Focus IT management on the big picture, improve business value and reduce the cost of data Data warehouses can help

More information

Minimize Access Risk and Prevent Fraud With SAP Access Control

Minimize Access Risk and Prevent Fraud With SAP Access Control SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits Office of the Inspector General United States Office of Personnel Management Statement of Michael R. Esser Assistant Inspector General for Audits before the Committee on Appropriations United States Senate

More information

TOP. Steps to Success. TOP 10 Best Practices. Password Management With a Plan. www.avatier.com

TOP. Steps to Success. TOP 10 Best Practices. Password Management With a Plan. www.avatier.com Best Practices Allowing business users to manage their own password changes can significantly reduce help desk calls. Most importantly, having a centralized password management process and solution in

More information

QUICK FACTS. Helping a Software-as-a-Service Provider Scale up Automated Testing TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES

QUICK FACTS. Helping a Software-as-a-Service Provider Scale up Automated Testing TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES [ Information Technology, Quality Assurance and Testing ] TEKSYSTEMS GLOBAL SERVICES CUSTOMER SUCCESS STORIES Client Profile Industry: Digital marketing Revenue: Approximately $300 million Employees: Approximately

More information

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES

Title here. Successful Business Model Transformation. in the Financial Services Industry. KPMG s Evolving World of Risk Management SECTORS AND THEMES SECTORS AND THEMES Successful Business Model Transformation Title here in the Financial Services Industry Additional information in Univers 45 Light 12pt on 16pt leading KPMG s Evolving World of Risk Management

More information

Reaching New Heights: Providing Consistent and Sustainable High Performance at the State Level

Reaching New Heights: Providing Consistent and Sustainable High Performance at the State Level August 2013 Reaching New Heights: Providing Consistent and Sustainable High Performance at the State Level A Study Conducted by Oracle and the National Association of State Auditors, Comptrollers and Treasurers

More information

White paper. Four Best Practices for Secure Web Access

White paper. Four Best Practices for Secure Web Access White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency

More information

Is Your Identity Management Program Protecting Your Federal Systems?

Is Your Identity Management Program Protecting Your Federal Systems? Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to

More information

DEVELOPING AN EFFECTIVE INTERNAL AUDIT TECHNOLOGY STRATEGY

DEVELOPING AN EFFECTIVE INTERNAL AUDIT TECHNOLOGY STRATEGY DEVELOPING AN EFFECTIVE INTERNAL AUDIT TECHNOLOGY STRATEGY SEPTEMBER 2012 DISCLAIMER Copyright 2012 by The Institute of Internal Auditors (IIA) located at 247 Maitland Ave., Altamonte Springs, Fla., 32701,

More information

HR Function Optimization

HR Function Optimization HR Function Optimization People & Change Advisory Services kpmg.com/in Unlocking the value of human capital Human Resources function is now recognized as a strategic enabler, aimed at delivering sustainable

More information

Softchoice Solution Guide: five things you need to know about single-sign on

Softchoice Solution Guide: five things you need to know about single-sign on Softchoice Solution Guide: five things you need to know about single-sign on Executives increasingly want to realize the business value from an identity and access management solution. It s no wonder:

More information

Transforming Your Core Banking and Lending Platform

Transforming Your Core Banking and Lending Platform Transforming Your Core Banking and Lending Platform Dramatically improve your bank s core systems to increase operating agility, lower time to market, reduce costs and better manage risk and regulatory

More information

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University. manzano@cs.fsu.

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University. manzano@cs.fsu. Enterprise Security Moving from Chaos to Control with Integrated Security Management Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Enterprise Security Challenges Implementing

More information

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Whitepaper: 7 Steps to Developing a Cloud Security Plan Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Identity and Access Management The road to sustained compliance

Identity and Access Management The road to sustained compliance Identity and Access Management The road to sustained compliance Identity and Access Management An overview 1 On-boarding is the process of establishing an identity for a person, device, or system account

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

IBM Global Business Services White Paper. Insurance billing and payment transformation Why now?

IBM Global Business Services White Paper. Insurance billing and payment transformation Why now? IBM Global Business Services White Paper Insurance billing and payment transformation Why now? 2 Insurance billing and payment transformation Why now? IBM Global Business Services 3 Introduction Customer

More information

White paper. Business-Driven Identity and Access Management: Why This New Approach Matters

White paper. Business-Driven Identity and Access Management: Why This New Approach Matters White paper Business-Driven Identity and Access Management: Why This New Approach Matters Executive Summary For years, security and business managers have known that identity and access management (IAM)

More information

Services for the CFO Financial Management Consulting

Services for the CFO Financial Management Consulting IBM Global Business Services Services for the CFO Financial Management Consulting Financial Management Chief financial officers (CFOs) are currently in a highly visible, highly influential position. They

More information

Importance of the Consumer Financial Protection Bureau

Importance of the Consumer Financial Protection Bureau Importance of the Consumer Financial Protection Bureau The aftermath of the financial crisis affected millions of Americans. The U.S. economy was devastated as companies crumbled, homeowners lost their

More information

Part 3: Business Case and Readiness

Part 3: Business Case and Readiness The Fundamentals of Managed Service Provider (MSP) Programs Part 3 of 3 Part 3: Business Case and Readiness By Jennifer Spicher contents This is the final of a three-part series designed to outline key

More information