Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Similar documents
It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Project Por)olio Management

Identity and Access Positioning of Paradgimo

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Privileged Administra0on Best Prac0ces :: September 1, 2015

Everything You Need to Know about Cloud BI. Freek Kamst

Strategy and Architecture to Establish 'Smart Plants'

Formula*ng a Recipe for Analy*c Success. Elaine McKechnie Head of Group MIS April 2015

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

PROJECT PORTFOLIO SUITE

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

The Real Score of Cloud

Realm of Big Data Ini0a0ves

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

Capitalize on your carbon management solu4on investment

Connec(ng to the NC Educa(on Cloud

Phone Systems Buyer s Guide

UNIFIED, END- TO- END EDISCOVERY

Driving Working Capital Op1miza1on from AP - rather than Treasury

Fixed Scope Offering (FSO) for Oracle SRM

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Exchange of experience from a SuccessFactors LMS Implementa9on

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

How To Protect Virtualized Data From Security Threats

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Case Study. The SACM Journey at the Ontario Government

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al

The Unique Alternative to the Big Four. Identity and Access Management

Building your cloud porbolio APS Connect

Identity Lifecycle Management. Lessons Learned

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners

Oracle Role Manager. An Oracle White Paper Updated June 2009

DTCC Data Quality Survey Industry Report

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Delivering value to the business with IAM

UAB Cyber Security Ini1a1ve

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

Cloud Security: Is It Safe To Go In Yet?

An Econocom Group company. Your partner in the transi4on towards Mobile IT

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Payments Cards and Mobile Consul3ng Overview 2013

Legacy Archiving How many lights do you leave on? September 14 th, 2015

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

Cloud Compu)ng in Educa)on and Research

Take 5 Solutions - All Rights Reserved.

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Interac(ve Broker (UK) Limited Webinar: Proprietary Trading Groups

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Splunk for Networking and SDN

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

Quest One Identity Solution. Simplifying Identity and Access Management

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Capitalizing on Change

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

Big Data + Big Analytics Transforming the way you do business

AWS Security & Compliance

SIX STEPS TO IMPROVING MARKETING EFFICIENCIES

VMI: Building a Demand Driven Program to Drive Working Capital Savings. October 2014

Connecting to the NC Education Cloud

The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report

GAME-CHANGING TRENDS IN SUPPLY CHAIN

Transcription:

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance

Agenda Typical Business Drivers for IAM Programs Challenges with Traditional IDM The Journey from Provisioning to Governance The Case for Access Governance The Facts Case Studies

Typical Business Drivers for IAM Programs Regulatory Compliance Risk Reduc&on Opera&onal Efficiencies User Experience Pla<orm Consolida&on 360 o View of User Access and Ac;vity Compliance- Driven Repor;ng and User Access Reviews Protec;on of Sensi;ve Informa;on Assets Detec;ve and Preventa;ve Policy Enforcement Risk Measurement and Analysis Discovery of Rogue / Orphan / Privileged Accounts Automated Fulfillment and Password Management Processes Closed- Loop A:esta;on and Remedia;on Streamlined IAM Business Processes (i.e. joiners, movers, leavers) Single Interface for Access Request and Approval Processes Single or Consistent Sign- On to Secure Systems Faster Onboarding and Provisioning Migra;on From Legacy / Homegrown IAM Tools Consolida;on of IAM Infrastructure, PlaXorms and Tools Directory Consolida;on / Virtualiza;on

Challenges with Traditional IDM Implementa+ons are o6en IT- driven, not business- driven, reducing the likelihood of stakeholder buy- in Data, resource and process ownership conten;on can prove fatal without robust and sustained execu;ve sponsorship IDM is o\en perceived as a necessary evil, not a business enabler IDM should align with strategic business goals, not tac;cal IT wins Focus is on provisioning automa+on, not business process op+miza+on True cost of managing user access is in cumbersome business processes, not last mile provisioning Provisioning automa;on is high- risk if data is unclean and processes Ver;cal integra;on methodology increases ;me- to- value and promotes unnecessary re- engineering of business processes

Challenges with Traditional IDM Tools are cumbersome, intrusive, complex and costly to implement Require highly specialized skillsets, large infrastructure footprint Opera;onal support costs frequently exceed cost savings Provisioning- centric implementa;ons rarely deliver the expected business value Data cleansing is o6en overlooked, leading to unan+cipated complexity and budget/schedule overruns Even clean repositories need scrubbing Impossible to succeed without clean data

The Journey From Provisioning to Governance The classic ver;cal provisioning- centric approach to IDM approaches each target system with a unique set of business processes and provisioning mechanisms. This can lead to technical bo:lenecks, unnecessary complexity, project delays and a high likelihood of failure to deliver significant business value. A horizontal governance- centric approach is less intrusive, focusing on rapid integra;on of applica;ons and crea;ng a rich view of user access. Consistent policies and business processes can be layered on top of discovered privilege data. Last mile provisioning mechanisms can be subsequently enabled in either a manual or automated fashion.

The Case for Access Governance Access Governance focuses on crea+ng a rich 360 o view of user access, not automa+on of broken business processes A typical phase one involves loading account and en;tlements data from connected systems, and correla;ng to authorita;ve source(s) Facilitates data cleansing and rapid remedia;on of rogue / orphan / privileged accounts, immediately reducing organiza;onal risk Avoids the data / process conten;on and data quality issues that o\en plague tradi;onal IDM projects Drives accountability and ownership for user access to the business

The Case for Access Governance Comprehensive visibility into user access delivers rapid ROI Consolida;ng user access data into a single view enables: Detec;ve / Preventa;ve Policy Governance Centralized A:esta;ons and Closed- Loop Remedia;on Processes Role Mining and Analy;cs Risk Modeling and Scoring Op;miza;on of Business Processes

The Case for Access Governance Reduces the risk of provisioning automa+on Last Mile provisioning automa;on can be selec;vely and safely enabled for connected systems once data has been cleansed, consistent business processes have been defined and a robust governance framework is in place

The Facts Regulatory Compliance 65% of audit and compliance managers surveyed who believe their IT counterparts lack sufficient knowledge of risk and compliance issues to collaborate on IAM (Source: IT Compliance Ins0tute) 45% of customers had experienced audit findings involving excessive, cumula;ve employee access rights, and 35% had audit findings involving segrega;on of du;es viola;ons (Source: DeloiEe & Touche) Risk Reduc&on 85% of corpora;ons have experienced a data breach, at an average cost of $197 per record (Source: Ponemon Ins0tute) 74% of corpora;ons that experienced a data breach reported a loss in customers due to brand damage, and 59% faced poten;al li;ga;on or regulatory fines as a result (Source: IT Compliance Ins0tute) Opera&onal Efficiencies Automa;on can reduce ;me spent on manual processes by 50% and at the same ;me strengthen governance while driving accountability into the business (Source: Echelon One) Access governance automa;on significantly lowers internal costs and reduces external audi;ng fees by 25% or more (Source: IT Compliance Ins0tute)

Case Study: Top 5 Global Bank Customer Profile One of the world s largest banking/financial ins;tu;ons $119 billion in annual revenue 150K+ employees worldwide Phase 1 Scope Aggregated, correlated and cleansed data for 57 applica;ons Loaded Data for 25,000 users Generated access review reports to support cer;fica;on process Completed in 90 days! Immediate Impact Greatly reduced total cer;fica;on cycle ;me Improved user to cer;fier mapping Streamlined manual deprovisioning processes Next Steps Ini;ated Phase 2 deployment to expand scope Expanding solu;on to addi;onal business units

Case Study: Top 5 U.S. Insurance Company Customer Profile Leading insurer and financial services provider $125 billion in annual revenue 180K+ employees worldwide Phase 1 Scope Aggregated, correlated and cleansed data for 8 applica;ons Implemented automated access cer;fica;on processes Completed in 30 days! Immediate Impact Addressed key audit control issue by automa;ng manual processes Reduced cer;fica;on process ;me from months to days Gained complete view of user access privileges across applica;ons Next Steps Define enterprise role model and implement policy management infrastructure

Case Study: Electronics Manufacturing Firm Customer Profile Global supplier of semiconductor equipment 90 facili;es in 12 countries $8 billion in revenue 10K+ employees worldwide Scope Aggregated, correlated and cleansed data for 12 applica;ons Implemented automated access cer;fica;on processes Completed in 30 days! Immediate Impact Reduced orphan accounts from 1,400 to 7 accounts Improved governance through implementa;on of enterprise roles Lowered risk with real- ;me policy viola;on no;fica;ons Next Steps Deployment of role management and risk analy;cs capabili;es

Qubera Solu;ons Questions?

Qubera Solu;ons, Inc. USA 220 Twin Dolphin Dr, Suite C Redwood City, CA 95065, USA Tel: 408-385- 7370 www.quberasolu;ons.com UNITED KINGDOM & EUROPE 68 Lombard Street EC3V 9LJ, London, United Kingdom Tel: 0208 133 6363 www.quberasolu;ons.com Qubera Solu;ons