SAM Enterprise Identity Manager



Similar documents
SAM Business Process Workflow

IBM Tivoli Service Request Manager

Beta UX DistributionMaster

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

IBM Tivoli Identity Manager

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management

Identity and Access Management

IBM Content Integrator Enterprise Edition, Version 8.5.1

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

SAP Identity Management Overview

IBM Tivoli Directory Integrator

Securing your business

SAP NetWeaver Identity

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

SAP Solutions for Small Businesses and Midsize Companies. Press Fact Sheet March 2008

How can Identity and Access Management help me to improve compliance and drive business performance?

IBM Customer Experience Suite and Electronic Forms

midpoint Overview Radovan Semančík December 2015

IBM Cognos Performance Management Solutions for Oracle

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

SAP BusinessObjects EDGE BI WITH DATA MANAGEMENT CENTRALIZE DATA QUALITY FUNCTIONALITY. SAP Solutions for Small Businesses and Midsize Companies

Cisco TelePresence Manager


what if you could increase your agility and improve your pace of IT innovation?

IBM Software Group. Deliver effective governance for identity and access management.

SAP ERP HUMAN CAPITAL MANAGEMENT SOLUTION OVERVIEW

IBM Tivoli Federated Identity Manager

ACCESS INTELLIGENCE. an intelligent step beyond Access Management. White Paper

Address IT costs and streamline operations with IBM service desk and asset management.

SAP xapp Resource and Portfolio Management (SAP xrpm)

SAP NetWeaver. SAP NetWeaver

Collaboration solutions for midsized businesses Buyer s guide

SAP BusinessObjects Edge BI, Standard Package Preferred Business Intelligence Choice for Growing Companies

Integration and Infrastructure Software. IBM WebSphere Application Server Family. Flexible infrastructure for todayʼs business world.

IBM Rational Asset Manager

COMOS Platform. Worldwide data exchange for effective plant management.

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS

IBM Endpoint Manager for Lifecycle Management

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS

IBM Maximo technology for business and IT agility

Oracle Role Manager. An Oracle White Paper Updated June 2009

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking

CA Federation Manager

IBM SmartCloud Workload Automation

Extending the Power of Analytics with a Proven Data Warehousing. Solution

Identity Management: Securing Information in the HIPAA Environment

SAP FOR TELECOMMUNICATIONS

Automate your business processes with flexible forms, portals and process-based solutions from IBM.

mysap ERP mysap ERP HUMAN CAPITAL MANAGEMENT

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

Enterprise Identity Management Reference Architecture

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

FOCUS ON: FDR/UPSTREAM S ONLINE DATABASE SOLUTIONS

Provide access control with innovative solutions from IBM.

IBM Tivoli Compliance Insight Manager

Dell One Identity Manager Scalability and Performance

Cisco Intelligent Automation for Cloud

IBM BPM Solutions Addressing the Enterprise Business Process Management

IBM Security Access Manager for Web

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities.

Driving workload automation across the enterprise

What is it? What does it do? Benefits

etoken TMS (Token Management System) Frequently Asked Questions

Integration of SAP Netweaver User Management with LDAP

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Necto on Azure The Ultimate Cloud Solution for BI

IBM Security & Privacy Services

User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT

<Insert Picture Here> Oracle Identity And Access Management

Meeting the Challenges of Business Intelligence

Customer Relationship Management

BROCHURE ECOSYS EPC. Full Lifecycle Project Cost Controls

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Role Management in Access Governance & Intelligence

VERITAS NetBackup 6.0 Database and Application Protection

Kaseya IT Automation Framework

Quest Software Product Guide

DISCOVERY POWER. Fast Forward to Data Center Intelligence.

IBM Tivoli Composite Application Manager for WebSphere

IBM WebSphere Business Integration Monitor, Version 4.2.4

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Guardium Change Auditing System (CAS)

can I customize my identity management deployment without extensive coding and services?

Enhancing File System Search

Address IT costs and streamline operations with IBM service request and asset management solutions.

How To Use Ibm Tivoli Monitoring Software

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

OracleAS Identity Management Solving Real World Problems

CA SiteMinder SSO Agents for ERP Systems

Delivering a platform-independent based ESB for universal connectivity and transformation in heterogeneous IT environments.

Transcription:

SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure self-service for password management NEW

Management Summary: Bridging Business and IT Security The new generation of SAM allows customers to implement company-wide Identity Access Management (IAM) across different platform boundaries. SAM Enterprise Identity Manager puts the spotlight on the role of a company s staff. Extensive self-service functions empower your employees to reset forgotten passwords on their own or to apply for new access rights over the Web. As a result, your IAM system ideally connects all employees with the relevant business processes on an individual level. No matter which platforms and operating systems your company employs, we have the right solution for Windows, Unix and/or mainframe-based data centers. Our sophisticated and proven connector technology makes it easy to integrate any application into a comprehensive security administration architecture for your organization. The better the existing business processes and organizational workflows are mapped in the IAM, the better your company will benefit from the solution. The latest version of SAM Enterprise Identity Manager enables companies to establish automated lifecycle management of IT user roles, identities and access rights and align them with their organizational requirements. When using business process workflows, SAM enables you to optimize approval processes in an easy and transparent manner, enforce deputy rules and, at the same time, significantly improve user performance. Also, the user helpdesk task load is greatly reduced, resulting in substantial cost savings. The software offers extensive control options for managing conflicts arising within and among security-relevant business processes. It significantly reduces the cost of access management and setting up mutually exclusive access rights to meet confidentiality requirements. Further enhancing the role lifecycle process, SAM Next Generation makes it possible for the first time to define segregation of duties for roles. Platform Independent The next generation of SAM Enterprise Identity Manager can be run across all major platforms and databases. It doesn t make any difference whether you work with Oracle, SQL Server or DB2 SAM supports all of them. You can operate SAM separately or simultaneously on Windows, Unix and z/os platforms. Additionally, our target system connectors can support all common applications as well as your home-grown systems. 2

SAM Enterprise Identity Manager SAM Next Generation at a Glance! [SAM Enterprise Identity Manager] New, rich, full-featured business process workflow capabilities Sophisticated role mining, discovery and analysis functionality Multi-level «segregation of duties» management and reporting Business IT Services True platform independence Easy-to-use and secure self-service for password management Enhanced development platform and web services support Web-Based Workflows for Access Rights Requests Another highlight is the new integrated business process workflow. These are user-oriented request workflows designed for easy and intuitive handling. A Web interface is used to control the request workflows for automatically assigning user rights. The software you ll receive from us provides you with a simple and cost-effective means of capturing and mapping your workflows. The workflows are continuously monitored and can be flexibly aligned with organizational changes at any time. Ergonomic Navigation Using Sidetab Technology Ergonomic navigation using cutting-edge Sidetab technology allows users to handle SAM Business Process Workflow intuitively and with ease. Company-specific business processes are processed in a customized role-based access rights administration. Your workflows can be captured, mapped, processed, monitored and aligned with future business needs. The Business Process Workflow incorporates technology that facilitates the implementation of interfaces for all workflow systems, databases as well as import and export functions. The unique architecture ensures excellent life cycle adjustment of your individual workflows as well as a high return on investment (ROI). Business Process Workflows Highlights: Workflow engine for business process management Service-oriented architecture (SOA) and use of Web services NET plug-in architecture ITIL compatibility Consistent multi-client capability Highly ergonomic and intuitive High performance and web-based design Modular and scalable to any size Can be adjusted to meet industry-specific needs 3

[SAM Rolmine] [SAM BPW] Role Request/ Approval Recertification [SAM] [SAM Rolmine] Import of Roles User-Role Connection Setup Rule Engine Data Import [SAM Rolmine] Rights Database Analysis [SAM Rolmine] Role Mining Role Engineering Revalidation Compliance-/ History- Reports [SAM] RBAC Administration SoD [SAM] Role Maintenance SoD [SAM] [SAM BPW] Attestation Change Role Request Role Lifecycle Process with SAM Rolmine The better existing business processes and organizational processes are mapped in the IAM, the bigger the success and benefits of an IAM solution for your company. The new SAM product generation addresses these requirements more than ever before. As Gartner Analyst Group confirms, SAM is the first IAM solution on the market that supported rolebased rights assignment. These access roles form the interface between the actual business, business processes, and IT. Today, SAM controls the entire business- oriented role lifecycle. Next generation SAM supports the entire role lifecycle, from unlimited role hierarchies, dynamic roles and segregation of duties through to role mining in short: the bundling of access rights into user roles. SAM offers insight into existing access roles and requested roles in a highly transparent manner. The integrated SAM Rolmine analyzes and optimizes the role definition process, thus laying the foundation for business-oriented role lifecycle management. In concrete terms, SAM Rolmine links the existing organizational user information with required technical access information. SAM Rolmine is then used to create dynamic and static roles from the large number of individually assigned access rights and make these roles available for automated access rights assignment. Many customers achieve an automation rate exceeding 90% in their role-based access rights administration. Automated Lifecycle Management SAM enables companies to establish automated lifecycle management of IT user roles, identities and access rights and align them with their organizational requirements, no matter which platform is used to manage access rights across all applications. SAM is compatible with a wide range of platforms and databases: z/os, UNIX and Windows, as well as DB2, Oracle and MS SQL Server. 4

SAM Enterprise Identity Manager SAM was one of the first IAM products to incorporate basic role lifecycle-management into a product s provisioning process. Gartner Analyst Group 5

Segregation of Duties on the Business Level The segregation of duties and thus spheres of responsibility within an organization is of critical importance. One example is the dual control principle applied by banks. Without such a function, rising numbers of user IDs for instance as the result of mergers & acquisitions or reorganization measures would massively increase the administrative effort of assigning user rights to limit access. Another aspect is the targeted prevention of conflicts arising in the business processes. Role-based access control guarantees that no mutually exclusive access rights are assigned to the same user. With our solution, this measure, called Segregation of Duties (SoD), is performed automatically for applications. As a novel feature, SAM Next Generation makes it possible to define segregation of duties for roles. This makes SAM one of the first solutions on the market that support SoD for role-based access rights. SAM has been ensuring the vital and close alignment of organizational and technical access data for many years. Alignment of organizational and technical access data 6

SAM Enterprise Identity Manager 50% of Europe s largest banks secure their business processes with solutions from Beta Systems. Extensive Self-Service Functions for End Users Today, many employees, business partners and suppliers of companies are not offered the flexibility to post access requests over the Web, which would speed up the process of getting the right to access the required business information. Beta Systems SAM Enterprise Identity Manager offers a broad selection of self-servicefunctions for end users, allowing them to quickly submit applications over the Web and monitor the approval process in a safe and secure manner. Password Reset Forgotten passwords also no longer pose a problem as users are empowered to reset them on their own over the Web. This results in considerable cost savings to user administration and helpdesk operations, while at the same time improving user satisfaction. An integrated, fully web-based workflowprocess running in the background quickly transforms access rights requests into granted access and also takes care of documenting all access rights to critical business data on the IT level. Web Services Administration Processes from within Applications and Portals SAM Next Generation offers numerous new webbased, service-oriented user interfaces. As an additional innovation, it is now possible to use standard Web service technologies to initiate SAM administration processes from within applications and portals. This includes both reporting as well as the resulting flexible and fast administration of user and access data. Fully Java-based Components Java 6 Support SAM offers Web Service Description Language (WSDL)-compliant Web services. External applications can use the SOAP protocol to call up data. It is also possible to create, modify and delete business objects in SAM. SOAP is a lightweight network protocol for exchanging XML-based messages. 7

Lowering the cost of access rights administration with multi-client capabilities. Provisioning Engine with multi-client capabilities The powerful Provisioning Engine automatically matches user information from HR systems, corporate directories and organizational databases with the corresponding access rights in the integrated target systems. This facilitates rule-based security provisioning for cost-efficient and secure automation of administrative processes. Multiple Input Files for the Provisioning Engine SAM Next Generation can process data from various sources for the Provisioning Engine. These data records can originate from different databases with individual settings for the SAM Provisioning Engine. The user data, for example, comes from numerous companies/departments or represents user data for different areas of responsibility. Another application scenario could be the separation of internal and external users. This makes it possible to manage records from different business units and clients in separate source systems and then process the data according to the individual needs in a SAM Enterprise Identity Manager installation. The multi-client capability enables the processing of multiple input files, making the Provisioning Engine extremely flexible as regards the integration of external systems. This greatly facilitates the implementation of customer-specific IAM solutions. Companies managing very large numbers of users particularly benefit from this flexibility as it offers a vast potential for lowering the cost of access rights administration. 8

SAM Enterprise Identity Manager Target System Support The SAM Enterprise Identity Manager of the next generation supports the latest version of all standard target systems such as SAP, Lotus Notes, Microsoft or RACF. These interfaces are full, robust off-the-shelf interfaces for each target and thus does NOT require any scripting to implement. Previous SAM versions are updated in this respect to the level of support offered by SAM Next Generation. A selection of supported target systems: IBM AIX IBM DB2 CA ACF2 CA Top Secret HP-UX IBM Lotus Domino MS Exchange MS Windows Active Directory Oracle IBM AS/400 IBM RACF LDAP SAP R/3 Sun Solaris Tivoli Access Manager 9

Global installation base covering over 5,000,000 user IDs Integration of more than 400 affiliated companies in a single project Administration of 250,000 access rights for 65,000 users with 1,500 defined access roles Project Structure and Organization We have assisted our customers in successfully managing, organizing and planning projects for a broad range of installations. Our employees are highly qualified technology experts who also have a comprehensive understanding of our customers business processes. This trust rests on our many years of project experience. Our employees have been with us for a long time and know exactly what to look out for to create the solution that meets your company s needs to the dot. We are highly familiar with the IT issues that companies have to deal with when introducing Identity Access Management; especially in the context of tailoring the solution to their individual organizational and industry-specific requirements. Our long and close cooperation with a large and highly active user group community allows us to develop and implement our IAM solutions and projects in accordance with our customers specific needs. Our customers have been appreciating this for many years, and independent analysts have equally recognized our superior project competence. We build the bridge between business and IT. 10

SAM Enterprise Identity Manager Our Consulting Expertise Ensures the Success of Your Project It s no secret that many factors determine the success of an Identity Access Management solution. Based on our extensive experience, we are aware of just how true this is since we know that technology plays an important part in installing an IAM software solution, but other aspects are even more critical. In fact, the success of the project depends decisively on the close and coordinated cooperation of IT and your company organization. The better existing business processes and organizational processes are mapped in the IAM, the bigger the success and benefits of the solution for your company. Our Professional Services has been extending its store of experience over many years and can thus draw on consulting expertise that enables our teams to build a bridge between IT and a company s business. Beta Systems provides you with a Single Point of Contact and Responsibility for all your software, implementation, customization and support needs. 7 of Europe s 10 largest insurance groups employ solutions from Beta Systems. 11

SAM the Next IAM Generation Building the bridge between Business and IT SAM integrates into your business environment easily Uses standardized web services Plugs into the existing portal. Provides full web-based business oriented workflow SAM fully integrates built-in.role life-cycle management Easy to implement and maintain Povides lowest cost of ownership Beta Systems is a leading software provider of IT user management, data center management, compliance and document management solutions We develop high-quality software products and solutions for the automated processing of large volumes of data and documents. The products and solutions serve to optimize processes, improve security and boost the agility of your IT. 50% of Europe s largest banks secure their business processes with solutions from Beta Systems Our solutions help you to meet business requirements related to governance, risk management and compliance (GRC) and make your corporate IT more powerful in terms of availability, scalability and flexibility. 7 of Europe s 10 largest insurance groups employ solutions from Beta Systems An ever increasing number of major insurance companies rely on solutions from Beta Systems to manage their IT infrastructures. There are numerous company-wide installations that have been in use for many years. Beta Systems has more than 25 years experience and over 1,400 customer across the globe. www.betasystems.com Alt-Moabit 90d 10559 Berlin Phone +49 - (0) 30-72 61-18 - 0 Fax +49 - (0) 30-72 61-18 - 800 Beta Systems Software AG, 2010. All rights reserved. All Beta Systems Software AG product names and the corresponding logos contained in this publication are trademarks of the company in Germany and other countries. The names of products and services of other companies are trademarks of the respective companies. The same applies to the corresponding company names. The contents of this publication are non-binding and are provided for general information purposes only. Product details may differ depending on the country version. Statements made in this publication do not represent assurances, guarantees or statements to be construed as binding in any other way. Beta Systems Software AG does not assume any liability for errors or incomplete information contained in this publication.