PROTECT YOUR WORLD. Identity Management Solutions and Services



Similar documents
Cloud SSO and Federated Identity Management Solutions and Services

Authentication: Password Madness

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Extending Identity and Access Management

Global Headquarters: 5 Speen Street Framingham, MA USA P F

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Identity Management and Single Sign-On

The Unique Alternative to the Big Four. Identity and Access Management

Strengthen security with intelligent identity and access management

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Quest One Identity Solution. Simplifying Identity and Access Management

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

The Top 5 Federated Single Sign-On Scenarios

Citrix Password Manager 4.5 Partner and Sales FAQ

<Insert Picture Here> Oracle Identity And Access Management

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

How the Quest One Identity Solution Products Enhance Each Other

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Securing Physician and Patient Portals for HIPAA Compliance

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Choosing an SSO Solution Ten Smart Questions

Windows Least Privilege Management and Beyond

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

PortWise Access Management Suite

Advanced Authentication

CA SiteMinder SSO Agents for ERP Systems

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

PortWise Access Management Suite

SAML SSO Configuration

Vyom SSO-Edge: Single Sign-On Solution for BMC Remedy

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Securing the Cloud through Comprehensive Identity Management Solution

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

2013 AWS Worldwide Public Sector Summit Washington, D.C.

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Identity Relationship and Access Management for the Extended Enterprise

Securing the Service Desk in the Cloud

Identity Access Management Challenges and Best Practices

Business-Driven, Compliant Identity Management

How To Achieve Pca Compliance With Redhat Enterprise Linux

Provide access control with innovative solutions from IBM.

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Identity Management Overview. Bill Nelson Vice President of Professional Services

identity management in Linux and UNIX environments

Identity and Access Management Point of View

Manufacturer to Enhance Efficiency with Improved Identity Management

Bridging the Great Divide. The Convergence of Physical and Logical Security

101 Things to Know About Single Sign On

managing SSO with shared credentials

RSA SecurID Two-factor Authentication

Customer Identity and Access Management (CIAM) Buyer s Guide

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

An Overview of Samsung KNOX Active Directory and Group Policy Features

Improving Interoperability and Reducing Cost in the Data Centre

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Identity: The Key to the Future of Healthcare

How to Get to Single Sign-On

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

1 The intersection of IAM and the cloud

Aurora Hosted Services Hosted AD, Identity Management & ADFS

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Power Company Improves Customer Service, Decreases TCO with Microsoft SAP Solution

Two factor strong authentication. Complex solution for two factor strong authentication

Vendor Questionnaire

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Two-Factor Authentication

Identity and Access Management

Executive Summary P 1. ActivIdentity

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

The 7 Tenets of Successful Identity & Access Management

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

The Benefits of an Industry Standard Platform for Enterprise Sign-On

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Authentication Strategy: Balancing Security and Convenience

Intelligent Security Design, Development and Acquisition

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Authentication Solutions Buyer's Guide

Transcription:

PROTECT YOUR WORLD Identity Management Solutions and Services

Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and Success Factors Why CSC Questions

Controlling Access to Information is a Growing Problem Over 2.4 billion global Internet users Just under 6 billion mobile phone subscribers Over 1 billion users in Facebook DOD: 15,000 networks with 7M devices at 4,000 installations in 88 countries, all being scanned and probed millions of times a day Verizon 2012 Data Breach Investigations Report 855 incidents, 174 million compromised records

Challenges Security Users managing multiple identities and passwords Termination of entitlements Access to cloud hosted applications Compliance management SOX, GLBA, HIPAA, PHI, PCI, ITAR, NERC/CIP, FERC, NRC, HSPD-12, PCI, SOX, CFATS, EU DPD, JPIPL, etc. Knowing who has access to what, proving it, enforcing it, and monitoring it Creating and managing internal and external user identities Business enablement Need for access to information by external users Interoperability with agencies, partners, and citizens Streamlined user experience and enhanced productivity

Identity Management Architecture Security Policy Credentials Location Badges Passwords Tokens Certificates Smart Cards Biometrics RFID Enterprise Access Management Role and Business Relationship Management Federated Identity Management Enterprise Single Sign-on Partner A User Provisioning Password Management Authentication Service Access Enterprise Resources Partner B Meta Directory Service Directories Meta Directories Data Repositories Supply Chain Actions/Alarms Report Monitor Analytics Respond Governance, Risk, and Compliance (GRC) Management Breach Identification Policy Enforcement The emphasis is on creating trusted identities, safeguarding personal information, and controlling access to resources

CSC Identity Management Offerings Identity Management Consulting Services Current state assessments Workshops Identity Management and Access Management User Provisioning Role Management Web and Enterprise Single Sign-on PKI/Certificate based two-factor authentication Federated Identity Management (FIM) Cross domain single sign-on based on trust relationships Ping Federate Cloud SSO Federation for CSC outsourced clients to access support applications Identity Access Governance Access Certification Policy Management and Enforcement Identity Analytics and Role Management Compliance Reporting 24x7 Operational Support Services

Our Foundation Builder Approach to Solution Delivery ASSESS PLAN BUILD MANAGE The approach, based on our experience, limits the initial deployment scope to ensure success and put in place the foundation for the follow-on system integration effort. The solution deployment is accomplished in four phases: Phase I Assess: We begin with an assessment to gain an understanding of the client s identity management vision and strategy from both the business and technical perspectives. Phase II Plan: This phase includes design and development activities. Phase III Build: This phase represents actual migration of the platform data and deployment of the identity management infrastructure and software. The Build phase ends with production rollout. Phase IV Manage: Operational support services are provided in the Manage phase.

Identity Management Benefits Security Stronger authentication of identities Enhanced authorization and privilege management Accuracy in the provisioning/deprovisioning processes Compliance Centralized management of corporate risk Centralized enforcement of compliance policies and processes Reduced audit preparation costs Financial Decrease ID administration support costs Reduce costs associated with management of external users Self-service password reset reduces help desk costs Enterprise Access One digital identity for an individual in all enterprise systems Centralized credential management Control physical and logical access

Implementing Identity Management Solutions Lessons Learned and Key Success Factors Recognize that nothing is as political as Identity Active executive sponsorship is required Need enterprise-wide ownership and commitment to success Projects are 70% business process and 30% technology Minimize customization of the vendor software Start small to ensure early wins Have a project governance plan Internal communications, coordination, collaboration are implementation imperatives Plan for change

CSC Identity Management Capabilities Full service Consulting Current state assessment Service design, development, and integration Operational support services Dedicated security professionals Trained and experienced in: Sun, Oracle, SailPoint, Ping Identity, RSA, Microsoft (AD FS), VeriSign (Symantec), and Quest (former Voelcker ActiveEntry) solutions Smart card technologies Identity Management Lab, Newark, DE

Experience Federated identity management solution and services Developed, deployed, and support thirteen client-to-csc federations servicing more than 200,000 users Providing 24x7 operational support service to major UK consumer goods client including on-boarding additional applications Ongoing deployment at major U.S. health insurer to support up to 5 million users Ongoing deployment at U.S. Government Agency Identity and access management solutions and services Designed, deployed, and support global PKI authentication solution for Fortune 500 company Designed, deployed, and supported identity management and access management solution for federal healthcare agency (currently updating solution to new vendor product) Provided identity management operational support service for insurance services company Designed a comprehensive identity and access management solution to support more than 240,000 users for a Fortune 500 enterprise Designed, deployed, and support 10 global, strong authentication systems supporting more than 140,000 users Developed, deployed, and support global customized user-provisioning tool integrated with strong authentication system for major Fortune 500 client servicing more than 90,000 users Developed and support unique, certificate-based, strong authentication solution for SAP environment Designed and deployed biometric and smart card technology-based solutions for the Department of Defense and other federal agencies Designed and deployed Identity Management solution for the world s largest reinsurance company Managed Identity management design projects for major European Banks, Insurance companies, an Manufacturing companies

Success Stories Public Sector Chemical, Energy & Natural Resources Health Services Technology and Consumer Manufacturing CHALLENGE Address numerous security and account management requirements Account provisioning processes need to be compliant with Federal standards Reduce password reset call volume on the helpdesk CHALLENGE Replace static passwords and control access to all business critical computing systems and platforms across the enterprise CHALLENGE Enhance customer web site to enable SSO to other partners and services CHALLENGE Business users struggle with managing the growing variety of account IDs and passwords required to use employee centric applications Reduce number user logons and passwords CHALLENGE Reduce number of employee logons to seven CSC supported applications SOLUTION Created an enterprise-wide identity and access management strategy. SOLUTION Developed and deployed a customized user provisioning tool and strong authentication system serving more than 90,000 global users. SOLUTION Deployed Federated Identity Management (FIM) to enable customer cross domain access to partner sites. SOLUTION Developed and Enterprise Single Sign-on strategy. SOLUTION Deployed MS ADFS for federation between CSC and client. RESULTS Successfully deployed Sun Identity Manager provisioning tool. RESULTS The system secures all remote access, user desktop access to IBM mainframe, SAP, HP servers, over 1100 web applications and firewalls, as well as administrator access to the Unix operating system. RESULTS Successfully deployed PingFederate. There is an on going rollout to over 5.5 million users. RESULTS Completed a pre-deployment assessment and requirements definition engagement and provided the client with a project Roadmap and recommended solution vendor. RESULTS Over 30,000 employees have SSO capability to seven supported applications.

Questions? To learn more about CSC s Identity Management portfolio visit www.csc.com/cybersecurity

Thank You