Identity & Access Management
|
|
|
- George Bradford
- 10 years ago
- Views:
Transcription
1 Written by Alan Rodger, June 2004 TA000562IAM Technology Infrastructure Butler Group Subscription Services Identity & Access Management TECHNOLOGY AUDIT Open Systems Management (OSM) COSuser v2.3 Abstract COSuser provides user management and provisioning for users of UNIX-, Linux-, and Microsoft Windows-based infrastructures. It extends its centralised management of the organisational user population s structure, and access rights, to Microsoft Windows Server-based assets via its own agent technology and strong integration with Microsoft Identity Integration Server 2003 (MIIS), and allows assets from other types of environment to be managed, either via additional standard software or minor customisation. Butler Group sees identity and access management as a critical element of organisational capability that can bring wide-ranging benefits and protection against threats: providing powerful management facilities of this type to UNIX and Linux environments, in which these requirements are often poorly served, COSuser is a valuable tool for organisations with infrastructures that include these platforms, especially if integration with Microsoft Server-based assets is also a benefit. The assessment that is available from OSM for potential customers, as part of its Rapid User Management Analysis, provides an opportunity for evaluation of COSuser s benefits. KEY FINDINGS Provides powerful user management for UNIX and Linux environments. Customisation can also allow assets in other types of environment to be managed. Extends value to Microsoft Server-based infrastructure via MIIS. Key: Product Strength Product Weakness Point of Information LOOK AHEAD OSM intends to include TKB Wizard with COSuser as a usable tool for its customers, so that their own environments and assets can be managed by COSuser.
2 FUNCTIONALITY Product Analysis Product Operation COSuser is a user provisioning solution for mid- to large-sized users of distributed systems with UNIX or Linux infrastructures. The product extends its value by integrating with Microsoft s identity management infrastructure via MIIS, thereby enabling the unified management of identity and access across UNIX-, Linux-, and Windows-based applications and systems. It will also provision user information on Windows systems without MIIS being present. It provides organisations with centralised user administration, password synchronisation, password policy control, and browser-based workflow, as well as significantly enhancing the management of user accounts that is normally available on UNIX and Linux systems. User administration is role-based, implementing the individual s organisational responsibilities as access rights to applications, databases, directories, and operating systems. The organisational structure can be flexibly represented by hierarchical role definitions. Changes to the user s access to disparate infrastructure elements can be made centrally, and propagated to the affected systems. This automates the transfer of information through the organisation s IT infrastructure, saving time and cost, as well as increasing efficiency by avoiding duplication of effort, and potential error, in reflecting the changes throughout the infrastructure. A user making a password change in one place can have that password propagated to all applications to which access is authorised. Implementing Single Sign-On (SSO), this benefits individuals by allowing use of a single, selfchosen password that can be easy to remember, and benefits the organisation by reducing incidences of forgotten passwords leading to help desk calls. At the same time, password strength can be increased by COSuser s implementation of password policy, which can also enforce the frequency of password redundancy (so that passwords are changed often) and implement safeguards against password compromise in the case of passwords being reused, or easily guessed. The mechanisms provided by COSuser for dealing with forgotten passwords include challenge/response within the workflows, thereby implementing the checks and balances inherent within customary help desk processes without incurring the costs of human involvement. A Web browser-based workflow engine is linked through to the software to provide self-service for end-users to request new accounts, passwords, or access rights. Such requests can be routed automatically to the appropriate line managers for authorisation, using the role definition structure that has been defined, before the changes become effective within IT systems. The automation of these various processes enfranchises the end-user, and can significantly improve the image and value of services offered by the IT department, as well as enabling real benefits to be gained by the reduction of help desk use. The platforms and applications managed by COSuser are seen as a domain known as the COSuser Enterprise (see Figure 1). The deployment configuration of COSuser typically comprises one COSuser Master Server, and one COSuser FailOver Server. Additionally, every node for which management is undertaken must have a COSuser Agent residing either on that node or on the Master Server. Each managed node may, in turn, manage a number of other nodes for example, in a Microsoft Windows 2000 environment COSuser Agents might be installed only on the Active Directory Server(s) (ADS). 2
3 Figure 1: COSuser Architecture Any operating system, database management system, middleware or application that COSuser manages is referred to as a Target. In cases where many Targets run on a particular node, only a single Agent runs on that node. Each type of Target has its own, intrinsic access control mechanism for example, /etc/passwd for UNIX, Active Directory for Microsoft Windows Server environments, and Primary Domain Controller (PDC) for Microsoft Windows NT with which users of that Target need to be registered to have the requisite access to the Target s resources. In order to interact with a Target s access control mechanism, COSuser uses a Target Knowledge Base (TKB). A TKB consists of a plug-in to the Master Server, and a small component that resides on each managed Agent supporting that Target. The TKB enables COSuser to register users on each type of Target. The COSuser Master Server holds the central database of user account information, the policy engine (for defining roles, and templates), the transaction engine (which is a fully fledged job scheduler), an operations workflow scheduler, and the audit and reporting engine. It may optionally host the Web server, and Web browser-based workflow engine. OSM supplies TKBs for common Target resources, such as established operating system environments, databases, and applications. TKBs for other resources, such as in-house applications, can be developed rapidly by OSM or its partners using the TKB Wizard, which is also supplied to technically advanced customers during implementation projects. Scalability is addressed throughout the product. An example is the use of a transaction server so that not all user management transactions have to occur in real time. For transactions that are required to be committed in real time (e.g. password synchronisation) the transaction server can achieve this, while for other tasks (e.g. registering a new user) system updates can be deferred until quiet time on the target systems, in order that the resource-intensive operations involved in user registration do not degrade performance of priority applications supported. 3 Butler Direct Limited Technology Infrastructure
4 Resilience is provided by COSuser s FailOver module, which caters for failover of the Master Server. It allows the end-user to be unaffected by failure, as downtime does not prevent user management activities and COSuser will later action the missed transactions. In order to limit the cost of the maintenance necessary for large user populations, the product s user administration is role-centric a user account is created only when a user is allocated one or more roles. COSuser can be configured so that any change made to a role is propagated instantly to all users currently assigned to that role. However, policy may be controlled for an individual user, server, application, or Target account, if required. COSuser provides powerful de-provisioning features, with which individual users can be deleted, disarmed, or disabled. Disarming a user has the effect of removing accesses available via all the accounts that are owned, but the user can be later recreated without any loss of the access rights that were available. Deleting a user deletes all the accounts and is not reversible. Disabling a user prevents the use of any owned accounts until re-enabled, and is useful as an immediate measure to block access. Product Emphasis The features used to control user access to target applications also control access to COSuser features, and therefore offer the same degree of flexibility in its use. Secure delegation of access rights is available with a high level of granularity, at the level of individual tasks, commands, or use of programs. COSuser records changes made to its data within audit logs, and incorporates a number of views and reports that allow interrogation of activity relating to accounts, users, and passwords. Organisations increasingly rely on business-critical applications that run on a mix of platform types, and may be distributed across the enterprise. The user population for such applications can also be widely distributed, with roles and locations that change frequently. The addition, deletion, or modification of user accounts across all platforms to keep pace with users changing requirements is a challenging business problem, and one that is critical in safeguarding security and integrity of access to enterprise systems and applications. Factors like increasing regulatory and legislative compliance pressures also magnify the need for proper control of user identity across the assets and infrastructure controlled by IT departments. Compared to other enterprise platforms, UNIX- and Linux-based systems are often poorly served by identity and access management facilities. Many organisations that use such systems suffer increased costs and risk due to this, and COSuser provides an answer to their significant problems in this area. DEPLOYMENT Implementation of COSuser requires technical expertise from OSM, and a degree of assistance with requirements relating to policy, and customisation of application interfaces, is typical. Large projects will normally include an element of process engineering, for which systems integrators are often used, particularly if the COSuser implementation is as part of an end-to-end identity management strategy. The time period required for implementation varies according to the size and complexity of the project. At small sites, with few systems or little variety of type of operating system, and where user information is already well defined, completions have been achieved in a few weeks large implementations with heterogeneous environments and major process changes can take 1-2 years to complete, although benefits are obtained progressively through the period. 4
5 As the first step in implementing large and complex user management projects, OSM ensures that specific user management requirements, existing processes, and organisational dynamics are thoroughly analysed before implementing any software. OSM has developed Rapid User Management Analysis (RUMA) as its methodology to integrate this objective with the implementation of COSuser. RUMA normally involves five stages: An initial interview, free of charge, to discuss problems with existing user management processes, such as security lapses, poor service levels and excessive operational costs. Metrics relating to a potential engagement are gathered, such as the size and nature of the user population, and the application and infrastructure profile. Business analysis, confirming the business drivers (e.g. improving efficiency, control, security, or service levels), and any scope limitations. Technical analysis to determine existing practices and problems, conducted with key staff members involved in user management. An interim report to senior management, identifying areas for potential improvement that would address existing problems and provide quick wins. Typically, this portrays a choice for management between automating and improving existing technology and processes, and maximising efficiency and productivity by adopting a COSuser solution. One action point from this stage is for senior management to identify the relative priorities of systems that might be linked to a COSuser solution, in order for the final RUMA stage to include estimates for building the solution. A complete report, including recommendations for process replacement or retention, incorporation of best practice (including take-on of existing user data), and stating formal objectives, plans, and costs in a proposal for an implementation project. Implementation can be undertaken in a horizontal manner (for example, by implementing on all UNIX servers first) or in a vertical fashion (e.g. implementing on all servers and applications required to facilitate the ERP system). After implementation, the resource commitment to COSuser is typically very low (one or more COSuser administrators are normally required), as the product automates a significant part of the workload of user management, and what cannot be automated is normally delegated via the COSuser operations workflow engine, or the Web browser-based workflow engine, to help desk or business users. OSM states that a positive Return On Investment (ROI) is achieved typically in a 12- to 18-month period. OSM provides a choice of levels of support: prime-time support is charged at 15% of the licence fee per year, and 24x7 support at 20% of licence fee per year. 24-hour support is provided using a transparent Follow the Sun mechanism, with help desks in the UK, US, and Australia logging problems to a centralised database. Training from OSM is either classroom-based or conducted on-site and is available as separate courses for Managers, Administrators, and Operators. The Master Server within COSuser can currently be deployed in the following environments: Sun Solaris, version 8 or 9. IBM AIX 5.1 or 5.2. Red Hat Linux Enterprise Server 2.1 or 3.0. A port to HP-UX 11i is planned. 5 Butler Direct Limited Technology Infrastructure
6 Agent software allows COSuser management to extend to all common varieties of UNIX, Linux, and Microsoft Windows server environments. For other environments, OSM can supply existing TKBs or write new ones at minimal cost. The COSuser client environment is available via X Windows on UNIX or Linux, on MS Windows, via a Web browser, or a command line interface (CLI). PRODUCT STRATEGY The target market for COSuser is large users of UNIX or Linux infrastructures, who would probably have Windows environments additionally, and who have a user population of 1,000 or more. COSuser provides significant extra functionality in the management of user accounts on UNIX and Linux systems, e.g. root shell auditing and access controls such management is critical in minimising risks arising from legislation, cyber-terrorism, and audit requirements. COSuser is sold directly, with some sales additionally arising from industry alliances with other ISVs (e.g. Microsoft, and Oblix, who are key technology partners) and systems integrators (e.g. CSC). Lockheed Martin, and Fujitsu Services are also OSM s preferred systems integrator partners. The licence cost is one time payment (perpetual) with a recurring annual maintenance and support cost. All elements of the software solution are included as standard, and an additional charge is made according to the number of user accounts being managed. Professional services are charged for implementation. There is no typical installation but OSM states that an average historical cost would be about US$250,000, of which 60% would be the cost of the software. Major releases are made available once per year, with patches of interim fixes or minor enhancements released more frequently. The next major release is planned for the second half of 2004, and annually thereafter. Butler Group considers OSM s strategy for COSuser to be excellent, particularly in its choice of Microsoft and Oblix as technology partners. Both have strong market presence (Microsoft s with MIIS and Active Directory, and Oblix with NetPoint) and each form strong parts of an identity and access management solution, but do not meet every organisational requirement for such a solution COSuser will form another vital piece of the jigsaw for customers. The combined user base of Microsoft and Oblix should provide numerous opportunities for COSuser s extension of the less advanced features that are natively offered within UNIX and Linux environments (which Butler Group expects to see in ubiquitous use across enterprise environments). COMPANY PROFILE OSM was established in 1988, and for a number of years undertook specialist services work with expertise in system administration on UNIX machines. As a number of assignments in such technical environments involved establishing centralised administration of users and their access rights, OSM recognised a market opportunity and took the step of developing a product to fulfil this need. Its headquarters are in Ascot in the UK, and it also has US offices for sales and support staff in Seattle and Baltimore, and also in Perth, in Western Australia (where part of the product development work is also undertaken). 6
7 The company is privately owned, with backing from 3i. 60% of its revenues are earned in the UK, 25% in the US, and 15% in other regions. Its forecast revenues in its current year are UK 4.3 million, and in prior years were as follows: Year (figures in UK million) Revenues Profit/(Loss) 0.4 (0.376) (0.551) Losses were incurred in 2001 and 2002 as OSM used its investment from 3i to build the COSuser product. Revenue history included sales of third-party products which have been progressively dropped as OSM focused on its own software. The company has approximately 40 employees, of whom the majority are based in the UK, and additionally uses contract workers. Of the employees, 14 work in research and development, 9 is sales or marketing, 11 in consultancy and support, and the remainder in finance and administration. The number of staff is expected to grow by 25% in the forthcoming 12 months. OSM states that it has 47 customers of COSuser and its previous incarnation, the COSadmin product, with the company s total customer base extending to over 1,000. The following are key COSuser customers: Lloyds TSB. Northumbrian Water. Procket Networks. Duke Energy. SUMMARY By enabling powerful management of user access rights in UNIX and Linux environments, COSuser has a distinct and valuable niche in the competitive market place of identity and access management products. With facilities for user administration, password synchronisation and policy control, and workflow that enables it to be integrated as a business process, COSuser significantly augments the management of user accounts that is available on standard UNIX and Linux systems. Offering integration with Microsoft s identity framework (via an integration module with MIIS) extends the value of the solution for the many organisations that operate heterogeneous IT infrastructures. COSuser s capabilities offer potential benefits of cost saving, increased efficiency, and widened management of identity and access that highly recommend it as a consideration for such organisations, in the mid- to large-sized sector, that are OSM s target market. 7 Butler Direct Limited Technology Infrastructure
8 CONTACT DETAILS Europe Open Systems Management Ltd Kings Ride Court Kings Ride Ascot, Berkshire SL5 7JR UK Tel: +44 (0) Fax: +44 (0) North America Open Systems Management, Inc Third Avenue Suite 905 Seattle WA USA Tel: Fax: Important Notice: About Butler Group: For more information on Butler Group s Subscription Services, contact: This report contains data and information up-to-date and correct to the best of our knowledge at the time of preparation. The data and information comes from a variety of sources outside our direct control, therefore Butler Direct Limited cannot give any guarantees relating to the content of this report. Ultimate responsibility for all interpretations of, and use of, data, information and commentary in this report remains with you. Butler Direct Limited will not be liable for any interpretations or decisions made by you. Butler Group is the premier European provider of Information Technology research, analysis, and advice. Founded in 1990 by Martin Butler, the Company is respected throughout the business world for the impartiality and incisiveness of its research and opinion. Butler Group provides a comprehensive portfolio of Research, Events, and Subscription Services, catering for the specialised needs of all levels of executive, from IT professionals to senior managers and board directors. Europa House, 184 Ferensway, Hull, East Yorkshire, HU1 3UT, UK Tel: +44 (0) Fax: +44 (0)
Security and Services
Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Translation Management System
Reference Code: TA001289CMT Publication Date: June 2007 Author: Sue Clarke TECHNOLOGY AUDIT Translation Management System SDL International BUTLER GROUP VIEW ABSTRACT SDL Translation Management System
IBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
Centrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Citrix MetaFrame Password Manager 2.5
F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information
Symantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background
Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background What is a privileged user? A privileged user is an individual who, by virtue of function,
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
End-to-End Identity Management With Oblix and Microsoft WHITEPAPER
End-to-End Identity Management With Oblix and Microsoft WHITEPAPER Copyright 2004 Oblix, Inc. All rights reserved This white paper is for informational purposes only. Oblix makes no warranties, expressed
How To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
MICROSOFT DYNAMICS CRM SERVICES & SOLUTIONS
You may be getting started and looking for a new system, have outgrown your existing software or feel your current implementation or support service could be improved. Whatever stage you are at in considering
IBM Maximo Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory
W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Automated User Provisioning
Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110
Hosted OCS Service Definition
Hosted OCS Service Definition SD033 v1.2 Issue Date 28 th February 2013 Hosted OCS Service Definition Overview InTechnology s Hosted OCS service is a corporate Instant Messaging (IM), Presence, and Conferencing
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
Quest Software Product Guide
Quest Software Product Guide Quest Software knows the expectations customers have for IT investments are not always met. That s why we develop innovative products that help our customers get more performance
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
Manufacturer to Enhance Efficiency with Improved Identity Management
Microsoft Forefront: Security Products for Business Customer Solution Case Study Manufacturer to Enhance Efficiency with Improved Identity Management Overview Country or Region: United States Industry:
DocAve Software Platform
TECHNOLOGY AUDIT DocAve Software Platform AvePoint Reference Code: OI00069-021 Publication Date: July 2011 Author: Mike Davis SUMMARY Catalyst AvePoint's DocAve Software Platform v5.6 provides an enterprise-strength
Maximizer CRM Enterprise Edition
Maximizer CRM Enterprise Innovative and sophisticated CRM for medium to large organisations Today s demanding medium to largesized businesses are challenged with competing in a fierce market against tough
CA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Identity & Access Management
TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R R e d H a t E n t e r p r i s e L i n u x i n U s e : S e r v i c e s C o m p
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
Altiris Server Management Suite 7.1 from Symantec
Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated
White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.
White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
HP Identity Management for manufacturing companies
HP Identity Management for manufacturing companies Be faster to market through secure access HP making identity management work HP s broad platform support and superior, standards-based architecture enabled
Module 1 Study Guide
Module 1 Study Guide Introduction to OSA Welcome to your Study Guide. This document is supplementary to the information available to you online, and should be used in conjunction with the videos, quizzes
Introduction to Customer Relationship Management (CRM) Systems
Introduction to Customer Relationship Management (CRM) Systems CRM systems give organisations the technology and business processes to easily identify, acquire and retain profitable clients. CRM applications
With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.
Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Password Management Before User Provisioning
Password Management Before User Provisioning 2015 Hitachi ID Systems, Inc. All rights reserved. Identity management spans technologies including password management, user profile management, user provisioning
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Twelve compelling reasons why you should choose MCS and our hire management solutions
Twelve compelling reasons why you should choose MCS and our hire management solutions Twelve reasons why you should choose MCS 01 Twelve reasons why you should choose MCS This document presents 12 powerful
CA Automation Suite for Data Centers
PRODUCT SHEET CA Automation Suite for Data Centers agility made possible Technology has outpaced the ability to manage it manually in every large enterprise and many smaller ones. Failure to build and
REQUEST FOR PROPOSAL SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE. Tender No. ECIL / CSD / 10-3053 dated 27.05.2011
REQUEST FOR PROPOSAL FOR SUPPLY, INSTALLATION AND CUSTOMIZATION OF HELPDESK SOFTWARE Tender No. ECIL / CSD / 10-3053 dated 27.05.2011 ELECTRONICS CORPORATION OF INDIA LTD ( A Government of India Enterprise
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Aurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
Management Packs for Database
Management Packs for Database Diagnostics Pack for Database Oracle Diagnostics Pack for Database offers a complete, cost-effective, and easy to use solution for managing the performance of Oracle Database
Using Microsoft Active Directory in the Domino World
Using Microsoft Active Directory in the Domino World PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
IBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.
Attix5 Pro Overview V7.x An overview of the Attix5 Pro product suite. Copyright notice and proprietary information This document is published by Attix5 or its local affiliated company, without any warranty.
automates system administration for homogeneous and heterogeneous networks
IT SERVICES SOLUTIONS SOFTWARE IT Services CONSULTING Operational Concepts Security Solutions Linux Cluster Computing automates system administration for homogeneous and heterogeneous networks System Management
Virtualization Case Study
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
Maximizer CRM Group Edition
Maximizer CRM Group Full featured and affordable CRM for small to medium sized enterprises Maximizer CRM Group is a fullfeatured CRM software solution that enables teams of up to ten users to work together
Cisco Intelligent Automation for Cloud
Product Data Sheet Cisco Intelligent Automation for Cloud Early adopters of cloud-based service delivery were seeking additional cost savings beyond those achieved with server virtualization and abstraction.
Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
We use VBAK all the time for file restores and if someone wants an old copy of a document, it can be found rapidly.
Secure Secure business business data through data automated through backup automated and restore backup and restore Why VBAK? The operational and financial implications of losing data could be catastrophic
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
JUNOScope IP Service Manager
Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies
User Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1)
User Guide Informatica Smart Plug-in for HP Operations Manager (Version 8.5.1) Informatica Smart Plug-in for HP Operations Manager User Guide Version 8.5.1 December 2008 Copyright 2008 Informatica Corporation.
ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009
Paper 341-2009 The Platform for SAS Business Analytics as a Centrally Managed Service Joe Zilka, SAS Institute, Inc., Copley, OH Greg Henderson, SAS Institute Inc., Cary, NC ABSTRACT Organizations that
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
sdsys THAGORAS SCISYS UK LTD The National Archives Customer Relationship Management System and Integrated Email Marketing Solution RESPONSE TO TENDER
sdsys THAGORAS SCISYS UK LTD The National Archives Customer Relationship Management System and Integrated Email Marketing Solution RESPONSE TO TENDER The National Archives Redacted under! IFOI exemption
Functional and technical specifications. Background
Functional and technical specifications Background In terms of the Public Audit Act, 2004 (Act No. 25 of 2004) (PAA), the deputy auditor-general (DAG) is responsible for maintaining an effective, efficient
Enterprise Single Sign-on (ESSO)
Reference Code: TA001301SEC Publication Date: August 2007 Author: Alan Rodger TECHNOLOGY AUDIT Enterprise Single Sign-on (ESSO) ActivIdentity BUTLER GROUP VIEW ABSTRACT Enterprise Single Sign On (ESSO),
Service Definition Document Microsoft Dynamics CRM Training
Service Definition Document Microsoft Dynamics CRM Training Date: 1 April 2014 Issued by: Matt Broomhall Head of Sales and Marketing Y: Name Tisski Limited: +44 (0) 203 418 0411 E: [email protected]
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
Tools to support Requirements-Based Testing
Requisite Pro RMT/RFT/RPT/Robot Rational Test Manager ClearQuest 26 IBM Rational Test Manager Test Manager runs as a schema on top of ClearQuest Version 7 Integrates with other IBM products, such as ClearCase,
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Cherwell Service Management v3.3 Cherwell Software, Inc.
Reference Code: TA001740ITM Publication Date: August 2009 Author: Chandranshu Singh and Stephen Mann TECHNOLOGY AUDIT Cherwell Service Management v3.3 Cherwell Software, Inc. BUTLER GROUP VIEW ABSTRACT
Softerra Adaxes Enterprise Directory Solution
Identity and Active Directory Management Softerra Adaxes Enterprise Directory Solution Product Profile make the complex simple Copyright Copyright Softerra, Ltd. Softerra, All rights Ltd. reserved. All
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
