Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada
|
|
- Matilda Tyler
- 8 years ago
- Views:
Transcription
1 Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada February 17 th, 2012 Victoria, B.C.
2 Presentation Outline Session Objectives IAM Linkage to Innovative Service Delivery: Case Study 1: Belgium - Flemish e-government Transformation Shifting from pull to innovative push models is changing the urgency for IAM Case Study 2: EU Self Certification Enabling Self Certification for Benefits Eligibility through Voice Print Biometrics and Mobile Authentication DEMO live voice print demonstration Case Study 3: Mobile Voting Global IAM Business Challenges Implications for IAM Program Design Market trends and models Technology considerations Reference architectures Global Initiatives: British Business Federation Authority (BBFA) Federated Identity Management Reference Implementations Government of Canada Pension Modernization: IAM Framework of Enterprise Applications U.S. Access India UID Solution Convergence Summary
3 Session Objectives To share through case studies, the linkages between fiscal climate change and IAM; and linkages of IAM to innovative service delivery To share reference models and innovative strategies for deploying large scale IAM solutions To exchange ideas about the business challenges of the public sector with respect to identity and access management
4 IAM LINKAGE TO INNOVATIVE SERVICE DELIVERY 4 HP Restricted 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
5 A Climate Change in Government Finance, not just a few Bad Winters US Federal Debt as Percentage of GDP ( ) 150% 121% 100% 102% Factors Impacting Long-Term Government Finances 50% 33% Ageing population 0% 40% Taxes as Percentage of GDP in OECD Countries ( ) Source: Office of Management and Budget Rising citizen service expectations 35% Sustainability 25% 20% Source: OECD Tax erosion from globalisation and ageing population
6 Operating Expense and IT Expenditure Average Total Operating Expense Average Breakdown of IT Expenditure 93.5% 6.5% Transform and Grow 27% Run 73% Source: Gartner, Inc., IT Key Metrics Data 2010: Key Industry Measures: Government Analysis: Multi Year
7 IT strategy to manage the fiscal crisis Minimize Maximize Explore 1 IT Run 2 Government 3 Disruptive Spending Return on IT Solutions
8 Maximizing Government Return on IT PUBLIC VALUE RETURN Policy Outcomes & Outputs Efficiency Quality of Service Public Trust Public Taxpayers Customers Citizens Government = Return on IT IT SPENDING
9 SERVICE DELIVERY INNOVATION CASE STUDIES 1) e-government: Belgium and the Flemish Government (2) Human services: EU Self-Certification using Mobile Telephony (3) Mobile Voting
10 Belgium / Flanders - MAGDA Platform
11 Case Study 1: Belgium and Flemish Government, Integrated focus on citizen & business value once-only data collection, multiple data (re) use i.e. A government that does not ask for what it already knows, and is truly certain of what it knows Key Drivers : Improved service delivery reduce administrative burden for enterprises pro-active delivery of entitlements to citizens Improved internal operations / administration avoid unnecessary double work (data entry & quality) simplify and streamline existing administrative processes 11
12 Origin: «Only Ask it Once» Situation Political support: Minister in charge had the key message in his policy letter e-government team in place Focus on citizen support resolution in parlement Focus e-gov on citizen and business at the regional level Implement the Only ask it regional level and extend to national level Ensure maximum privacy Only Ask it Once MAGDA ( Maximum Data Sharing Flemish Parliament Between Administrations and Agencies ) Platform 12
13 Framework components: Key Building Blocks Goal : Citizen Value Platform : MAGDA Citizen Value MAGDA Part of the coalition agreement and longterm vision (VIA) Authentic Data : the information, the value VIA 2020 strategy Authentic Sources Commitment Change agent Change agent : driver Legal & privacy regulation E-ID : the key to get access E-ID : key Legal Privacy (Video) 13
14 Case Study 2: Human services: Self-Certification using Mobile Telephony: EU Example Challenges: Increased demand for unemployment benefits Intense manual processes On-going certification requires regular visits to the Department for Social Protection Local Offices Long lines, staff overloaded Reduce welfare fraud and Desired Policy Outcomes: Improve service delivery against Customer Charter and Action Plan Increase certification frequency, to help reduce fraud and overpayments Examine new communication channels, including Self Certification using mobile telephony Ensure on-going controls are in place overpayments 14
15 PUBLIC VALUE FRAMEWORK SOCIAL PROTECTION PUBLIC VALUE POLICY OUTCOMES QUALITY OF SERVICE PUBLIC TRUST EFFICIENCY EXECUTIVE KPI CORE FINANCIAL KPI Increase Participation Easy Access, Prompt and Accurate Service (On-Budget) Planned vs. Actual Maximize FFP Identity and Secure and Incentives ; Access to Service Minimize Penalties; Minimize Fraud Admin Exp. As a Percentage of Benefits Expenditures BUSINESS INITIATIVES Implement New Access Channels Improve Registration and Authentication Control Benefit Expenditures / Reduce Fraud OPERATING KPI PROCESS/FUNCTION Improve Registration Intake / Eligibility Determination Improve Authentication and Access Reporting and Intake Improve Accuracy and Timeliness Payment Process PS Initiatives Mobile Certification IT Initiatives Application Services, Data Integration Services, Converged Infrastructure
16 Enrolment Best-Practices and Benefits Enrolment Best Practices Explain Enrolment process, obtain consent Gather voice sample, verify capture Verify enrolment with a test certification Enrolment complete Opt-in Service Benefits Supports in-country mobility Leverages voice print biometrics Reduces need to visit local offices Reduces program administration costs 16 Quick Demo
17 Case Study 3: Mobile Voting; Electoral Participation; Rising Expectations Developed countries Decline in voter participation Drop in turnout among young people Only 37.4 per cent of voters aged 18 to 24-years-old voted in the 2008 Canadian federal election, similar in US & UK; 49% of all eligible voters in 2011 Ontario election Developing countries Challenge to communicate information on polling centre locations and hours of operation Haiti elections: cell phones and internet to facilitate voter turnout United Nations Development Programme, Newsroom, March 18,
18 Internet mobile phone voting Example of mobile voting process Home Authentication Select candidate Cast Vote Confirmation Authentication Servicios Select Servicios Candidates Servicios Cast vote Servicios Confirmation Candidates Authentication Help Language Identification x PIN : Select your candidate from the next list and press ok: Candidate 1 Candidate 2 Candidate 3 You have selected next candidate: Candidate 1 Confirm and Cast vote? Your vote have been sent and cast. Receipt: fdsfksdopfiwpreoiwepoi gghfghfghgfhgfh Send Modify Send Have a nice day! Exit Back Help Back Next Help Mail receipt End First display shows browser menu and option to change language before proceeding. Authorize access to voting service through secure authentication Browse through candidates list (one after one), displaying: Candidate name and Party logo Confirm candidate selection, cipher the vote and cast the ballot Confirmation that the vote has been recorded, including a proof for the voter 18
19 GLOBAL IDENTITY MANAGEMENT BUSINESS CHALLENGES Implications for IAM Program Design: Market Trends and Models Reference Architectures Global Initiatives Reference Implementations 19 HP Restricted 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
20 Global Identity Management Business Challenges Citizens and businesses are demanding simpler access to government services across multiple delivery channels Privacy must be considered from both a trust and compliance perspective Current state: proliferation of identity stores and access management systems frustrate a citizen-centric transformation Citizens not only have multiple personas and contexts in terms of their interaction with government but they have multiple identities Understanding these personas and mapping them to appropriate information access is a significant business challenge Technologies are more mature but integration with legacy systems is still complex
21 Implications for IAM Program Design Business strategy and analysis of information management requirements need to lead introduction of technology Need to understand the risk profile of information assets and transactions and map to required levels of identity assurance Need to assess trade-offs: convenience versus control; individual control versus institutional control; cost versus residual risk Identify business partners and establish governance over IAM including trust agreements and levels of assurance on identity management process
22 Identity, Access and Governance Establishing trusted digital identities-identity proofing Authentication and risk Managing policy - authorization, personas, context Governance - authoritative sources, trust relationships, liability
23 What can IAM Enable? Streamlined service delivery from a government and citizen/business perspective - cost to serve, multi-channel A trust fabric for e-government essential for adoption A customized client experience BYOD Enhanced program integrity Reduced fraud and error Increased privacy protection Capability to push programs/services as well as provide targeted access to information
24 MARKET TRENDS AND MODELS 2011 Hewlett-Packard Development Company, L.P. HP 24 Restricted The information contained herein is subject to change without notice
25 Gartner IAM Hype Cycle Less than 2 years 2 to 5 years 5 to 10 years More than 10 years Key Points: transformational high 1.Value drives adoption 2.Hard to predict moderate technology curves 3.Industries drive specific solutions e.g. healthcare low
26 IAM Technology Considerations Granularity Context awareness Adaptive Delegation Extensibility Federation Standardization Legacy apps support-adapters e.g. provisioning Support for multiple authentication schemes Completeness of applicationscomponents or suites?
27 REFERENCE ARCHITECTURES 2011 Hewlett-Packard Development Company, L.P. HP 27 Restricted The information contained herein is subject to change without notice
28 Citizenship and Immigration Canada -TRBP
29 Oklahoma State Healthcare Information System Identity Management Policy & Access Management Federation & Access Control Digital Identity (X.509) SAML Token Service (STS) Auditing & Reporting User Registration Reliability/Data Integrity Interoperability - HIE, NwHIN Connect Data Management Firewall/DMZ Provisioning & De-provisioning Authorization (RBAC) Identity Registry Escalation - SOA Suite Governance - NIST Framework Perimeter Level Security
30 GLOBAL INITIATIVES British Business Federation Authority (BBFA) Federated Identity Management 2011 Hewlett-Packard Development Company, L.P. HP 30 Restricted The information contained herein is subject to change without notice
31 Building a Consistent Approach to Customer-Centric Digital Identity Assurance across all Public Services
32 UK Citizen Access to Government Services
33 Context of Identity
34 REFERENCE IMPLEMENTATIONS 2011 Hewlett-Packard Development Company, L.P. HP 34 Restricted The information contained herein is subject to change without notice
35 Government Canada Application Modernization and IAM (Pension Modernization) Access Management Applications Identity Management PKI Based Authentication Web Server AM WebGate TruePass SVM Authentication Events Oracle Access Manager AM WebGate AM WebGate Pay Matane Imaging Web Application AM WebGate Insurance AM WebGate Identity Manager Web Server OC4J Connector Active Member Enrolement Web Server AM WebGate TruePass Application Server Oracle WebLogic Application Server Userid & Password Authentication Web Server AM WebGate WebPass Access Manager Administration Web Server Policy Manager WebPass Oracle Access Manager Configuration Manager Oracle Application Server / OC4J OAM Configuration Manager Database Authentication Events AM WebGate Access Manager Access Server Access Manager Identity Server IDM Oracle Single Sign On (OSSO) Server Oracle Application Server / OC4J OAM Audit Records Access Manager Audit Database Authorization Events/Single Sign-On/ Session Management OSSO Session Creation Oracle Virtual Directory AM WebGate AM WebGate AM WebGate AM WebGate AM WebGate AM WebGate osso Siebel Call Centre Oracle Business Intelligence Dashboard Answers PenWeb Data Capture Tool Penfax Oracle Portal Crown Corporation Portal Active Member Pension Application Web Content Management Authentication Requests Authorization Lookups User Profile Operations Synchronization of user information via G+ adapter Authentication Requests Provisioning & reconciliation of user information IDM OID Genesys Workforce Management Provisioning of user info and reconciliation of groups & users Integration Broker BPEL Worklist Provisioning of user info and reconciliation of groups & users Hyperion Reports Provisioning of user info and reconciliation of groups & users Hyperion periodically connects to the IDM OID and updates it s security repository with the list of valid users. Universal Customer Master Portal OID Trusted reconciliation of employer representative information Provisioning & reconciliation of user information Oracle Application Server / OC4J Siebel Connector PenWeb Connector DCT Connector Penfax Connector OID Connector OID Connector Oracle Identity Manager API Oracle Identity Manager Active Member Authoritative Source DB Tables Connector Identity Manager Database Directory / Data Services TruePass SVM WebLogic Application Server Plugin Active Member Enrolment Application Oracle WebLogic Application Server Validation of shared secrets & reconciliation of user information PenWeb Database
36 USAccess and FEDERATED IDENTITY- CONCEPTUAL ARCHITECTURE Source: FICAM Roadmap and Implementation Guidance
37 India-Unique ID Programme Architecture
38 SUMMARY
39 Convergence of "Service Innovation" and "Technology Innovation" will Deliver Greatest Public Value Service Innovation Prevention Participation Collaboration Technology Innovation Mobility IAM: Whole-of- Government Enablers Cloud Computing Analytics 39
40 Summary A climate change in public finances is helping drive demand for IAM innovation IAM is not just a technology but a critical foundation block for e-government / m-government IAM must help improve policy outcomes, increase service quality, efficiencies and help build citizen trust Need to continue collaboration to develop and leverage IDM policy frameworks (e.g. Kantara and PanCanadian IDMA model) Need for a consistent framework for Whole of Government Enablers, to support both internal and external social media, collaborative tools, mobility, and access to public sector service delivery through multiple channels-anytime, anywhere The movement to cloud based services and mobile access is driving federated identity solutions. Incremental steps, pilots, and proof of concepts are delivering on the early promises of federation.
41 Presenter Contact Data Brian Reed, IAM Practice Lead, HP Canada Enterprise Services 41
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationOracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
More informationIDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
More informationEnabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationHOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
More informationOracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
More informationIdentity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationAlex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
More informationOracle E-Business Suite Single Sign On Using Oracle Access Manager
Oracle E-Business Suite Single Sign On Using Oracle Access Manager Session ID#: 301 Prepared by: Pierre Paniagua Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app About Pierre
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationEntrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
More informationKenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationIdentity and Access Management for the Hybrid Enterprise
Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver
More informationCan We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
More informationOracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
More informationA Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal
More informationState of Vermont Guidance on the Re-use of Software Products, Shared Components, and Hosted Platform Environment Capabilities
Introduction The State of Vermont (SoV) has adopted a high-level architecture that provides a contemporary and robust approach to meeting Vermont s Healthcare Services Enterprise (HSE) vision. As readers
More informationIdentity Management and Single Sign-On
Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationIdentity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
More informationEvaluating time and expense systems: Choosing the right platform for your organization
Evaluating time and expense systems: Choosing the right platform for your organization Prepared by: Art Shearon, Manager, McGladrey LLP 703.627.7795, art.shearon@mcgladrey.com August 2013 A growing number
More informationThe Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely
More informationFederation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority
Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority copyright of British Telecommunications plc 2006 Abstract As a large organisation with many partners BT has been
More informationRSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationTrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationSTATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationKey New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
More informationOverview of products, services and capabilities
Overview of products, services and capabilities Enterprise Agreement Capabilities Enterprise Agreement Subscription Desktop (Common) Perpetual Server and Additional Product For desktop enterprise products
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationIdentity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
More informationIdentity Management for Interoperable Health Information Exchanges
Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans
More informationIdentity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationNISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013
NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy
More informationEstablishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
More information<Insert Picture Here> Oracle CRM for Consumer Goods Smart Strategies for Profitable Growth
Oracle CRM for Consumer Goods Smart Strategies for Profitable Growth Angélique Moon Director, Consumer Goods CRM Product Strategy Safe Harbor Statement The following is intended to
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationVASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
More informationIdentity and Access Management. An Introduction to IAM
Identity and Access Management An Introduction to IAM Table of contents Introduction... 3 What is Identity and Access Management?... 3 Identity and Access Management components... 3 Business drivers for
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationAddressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing
More informationAre Passwords Passé?
Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon
More informationSOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
More informationProvisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
More informationBiometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity
More informationAchieving HIPAA Compliance with Identity and Access Management
Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views
More informationE-Government Service Delivery. Samir Said General Manager Microsoft Algeria
E-Government Service Delivery Samir Said General Manager Microsoft Algeria Microsoft e-government Strategy E-Government Definition egovernment is a spectrum of technology-inspired strategies adopted by
More informationOracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationIntegrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)
Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions Presented by Paul Jackson (Norman Leach) Agenda Why SSO Install Options Log Locations EBS Cloning Considerations Disaster Recovery
More informationThe Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience
The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience An Oracle White Paper February 2013 The Next Generation of Local Government
More informationIdentity in the Cloud
White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationB. Executive Summary
B. Executive Summary Across the country, state governments face tough economic challenges. High unemployment is causing record numbers of citizens to seek public assistance, straining government s aging
More informationEnterprise Management Solutions Protection Profiles
Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All
More informationDRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationHow Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development
More informationQLIKVIEW IN THE ENTERPRISE
QLIKVIEW IN THE ENTERPRISE IT Overview The QlikView Business Discovery platform is a natural fit within an organization s Information Architecture, allowing IT and BI groups to serve the ever-growing analytical
More informationOnline Identity Attribute Exchange 2013-2014 Initiatives
Online Identity Attribute Exchange 2013-2014 Initiatives Agenda Overview AXN Services Framework Demonstration NSTIC Pilots Summary ABAC Services Attribute Exchange Network Page 2 AXN - Enabling IT & Other
More informationAGIMO and whole-of-government ICT Policy
AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy
More informationOracle Application Express and Oracle E-Business Suite. Love and Mariage!
Oracle Application Express and Oracle E-Business Suite Love and Mariage! Content 1 2 3 4 5 About me EBS Development Challenges EBS and APEX Examples of APEX extension for EBS Conclusion 2 Sylvain Martel
More informationIdentity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM
Identity Management Presented by Richard Brown Who is Cogito? Who are we? Why listen to us? Started as an information protection company working on the ADO PKI Moved into IdM as natural progression to
More informationOracle Mobile Security Management
Oracle Mobile Security Management Angelo Maria Bosis Technology Sales Consulting Director Milano, 19 Marzo 2014 Safe Harbor Statement The following is intended to outline our general
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationSimplify Enterprise Mobility. Frédéric Desbiens Principal Product Manager Mobility and Development Tools
Simplify Enterprise Mobility Frédéric Desbiens Principal Product Manager Mobility and Development Tools Agenda MARKET TRENDS ORACLE MOBILE STRATEGY MOBILE SUITE & SECURITY SUITE ROADMAP MOBILE CLOUD SERVICE
More informationNew Zealand Sets the Pace for SAML 2.0 Deployments
Case Study: New Zealand Sets the Pace for SAML 2.0 Deployments New Zealand proves that great things often come from small countries as it joins the ranks of e-government SAML 2.0 deployers with its wide-ranging
More informationGovernance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
More informationMigration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended
More informationCustomer centric transformation for next generation customer service CUSTOMER CENTRICITY
Social Mobile Data CUSTOMER CENTRICITY Cyber security Cloud Customer centric transformation for next generation customer service Solutions and services for improving customer focus and satisfaction across
More informationORACLE TAX ANALYTICS. The Solution. Oracle Tax Data Model KEY FEATURES
ORACLE TAX ANALYTICS KEY FEATURES A set of comprehensive and compatible BI Applications. Advanced insight into tax performance Built on World Class Oracle s Database and BI Technology Design after the
More informationStephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
More informationPrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
More informationFederated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
More informationSWISSVBS LEARNING CLOUD (SLC)
SWISSVBS LEARNING CLOUD (SLC) OVERVIEW The LMS for the Mobile-Cloud World The SwissVBS Learning Cloud (SLC) is an enterprise-class learning management and analytics platform. It is designed from the ground
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationCloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document
Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2
More informationBuilding Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationIdentity and Access Management The road to sustained compliance
Identity and Access Management The road to sustained compliance Identity and Access Management An overview 1 On-boarding is the process of establishing an identity for a person, device, or system account
More informationWIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
More informationAccess Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
More informationGovernment's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
More informationBusiness and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
More informationOracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes
More informationBest Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of
More information