Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance
Agenda Typical Business Drivers for IAM Programs Challenges with Traditional IDM The Journey from Provisioning to Governance The Case for Access Governance The Facts Case Studies
Typical Business Drivers for IAM Programs Regulatory Compliance Risk Reduc&on Opera&onal Efficiencies User Experience Pla<orm Consolida&on 360 o View of User Access and Ac;vity Compliance- Driven Repor;ng and User Access Reviews Protec;on of Sensi;ve Informa;on Assets Detec;ve and Preventa;ve Policy Enforcement Risk Measurement and Analysis Discovery of Rogue / Orphan / Privileged Accounts Automated Fulfillment and Password Management Processes Closed- Loop A:esta;on and Remedia;on Streamlined IAM Business Processes (i.e. joiners, movers, leavers) Single Interface for Access Request and Approval Processes Single or Consistent Sign- On to Secure Systems Faster Onboarding and Provisioning Migra;on From Legacy / Homegrown IAM Tools Consolida;on of IAM Infrastructure, PlaXorms and Tools Directory Consolida;on / Virtualiza;on
Challenges with Traditional IDM Implementa+ons are o6en IT- driven, not business- driven, reducing the likelihood of stakeholder buy- in Data, resource and process ownership conten;on can prove fatal without robust and sustained execu;ve sponsorship IDM is o\en perceived as a necessary evil, not a business enabler IDM should align with strategic business goals, not tac;cal IT wins Focus is on provisioning automa+on, not business process op+miza+on True cost of managing user access is in cumbersome business processes, not last mile provisioning Provisioning automa;on is high- risk if data is unclean and processes Ver;cal integra;on methodology increases ;me- to- value and promotes unnecessary re- engineering of business processes
Challenges with Traditional IDM Tools are cumbersome, intrusive, complex and costly to implement Require highly specialized skillsets, large infrastructure footprint Opera;onal support costs frequently exceed cost savings Provisioning- centric implementa;ons rarely deliver the expected business value Data cleansing is o6en overlooked, leading to unan+cipated complexity and budget/schedule overruns Even clean repositories need scrubbing Impossible to succeed without clean data
The Journey From Provisioning to Governance The classic ver;cal provisioning- centric approach to IDM approaches each target system with a unique set of business processes and provisioning mechanisms. This can lead to technical bo:lenecks, unnecessary complexity, project delays and a high likelihood of failure to deliver significant business value. A horizontal governance- centric approach is less intrusive, focusing on rapid integra;on of applica;ons and crea;ng a rich view of user access. Consistent policies and business processes can be layered on top of discovered privilege data. Last mile provisioning mechanisms can be subsequently enabled in either a manual or automated fashion.
The Case for Access Governance Access Governance focuses on crea+ng a rich 360 o view of user access, not automa+on of broken business processes A typical phase one involves loading account and en;tlements data from connected systems, and correla;ng to authorita;ve source(s) Facilitates data cleansing and rapid remedia;on of rogue / orphan / privileged accounts, immediately reducing organiza;onal risk Avoids the data / process conten;on and data quality issues that o\en plague tradi;onal IDM projects Drives accountability and ownership for user access to the business
The Case for Access Governance Comprehensive visibility into user access delivers rapid ROI Consolida;ng user access data into a single view enables: Detec;ve / Preventa;ve Policy Governance Centralized A:esta;ons and Closed- Loop Remedia;on Processes Role Mining and Analy;cs Risk Modeling and Scoring Op;miza;on of Business Processes
The Case for Access Governance Reduces the risk of provisioning automa+on Last Mile provisioning automa;on can be selec;vely and safely enabled for connected systems once data has been cleansed, consistent business processes have been defined and a robust governance framework is in place
The Facts Regulatory Compliance 65% of audit and compliance managers surveyed who believe their IT counterparts lack sufficient knowledge of risk and compliance issues to collaborate on IAM (Source: IT Compliance Ins0tute) 45% of customers had experienced audit findings involving excessive, cumula;ve employee access rights, and 35% had audit findings involving segrega;on of du;es viola;ons (Source: DeloiEe & Touche) Risk Reduc&on 85% of corpora;ons have experienced a data breach, at an average cost of $197 per record (Source: Ponemon Ins0tute) 74% of corpora;ons that experienced a data breach reported a loss in customers due to brand damage, and 59% faced poten;al li;ga;on or regulatory fines as a result (Source: IT Compliance Ins0tute) Opera&onal Efficiencies Automa;on can reduce ;me spent on manual processes by 50% and at the same ;me strengthen governance while driving accountability into the business (Source: Echelon One) Access governance automa;on significantly lowers internal costs and reduces external audi;ng fees by 25% or more (Source: IT Compliance Ins0tute)
Case Study: Top 5 Global Bank Customer Profile One of the world s largest banking/financial ins;tu;ons $119 billion in annual revenue 150K+ employees worldwide Phase 1 Scope Aggregated, correlated and cleansed data for 57 applica;ons Loaded Data for 25,000 users Generated access review reports to support cer;fica;on process Completed in 90 days! Immediate Impact Greatly reduced total cer;fica;on cycle ;me Improved user to cer;fier mapping Streamlined manual deprovisioning processes Next Steps Ini;ated Phase 2 deployment to expand scope Expanding solu;on to addi;onal business units
Case Study: Top 5 U.S. Insurance Company Customer Profile Leading insurer and financial services provider $125 billion in annual revenue 180K+ employees worldwide Phase 1 Scope Aggregated, correlated and cleansed data for 8 applica;ons Implemented automated access cer;fica;on processes Completed in 30 days! Immediate Impact Addressed key audit control issue by automa;ng manual processes Reduced cer;fica;on process ;me from months to days Gained complete view of user access privileges across applica;ons Next Steps Define enterprise role model and implement policy management infrastructure
Case Study: Electronics Manufacturing Firm Customer Profile Global supplier of semiconductor equipment 90 facili;es in 12 countries $8 billion in revenue 10K+ employees worldwide Scope Aggregated, correlated and cleansed data for 12 applica;ons Implemented automated access cer;fica;on processes Completed in 30 days! Immediate Impact Reduced orphan accounts from 1,400 to 7 accounts Improved governance through implementa;on of enterprise roles Lowered risk with real- ;me policy viola;on no;fica;ons Next Steps Deployment of role management and risk analy;cs capabili;es
Qubera Solu;ons Questions?
Qubera Solu;ons, Inc. USA 220 Twin Dolphin Dr, Suite C Redwood City, CA 95065, USA Tel: 408-385- 7370 www.quberasolu;ons.com UNITED KINGDOM & EUROPE 68 Lombard Street EC3V 9LJ, London, United Kingdom Tel: 0208 133 6363 www.quberasolu;ons.com Qubera Solu;ons