syscovery Savvy Suite Whitepaper Identity and Access Management
whitepaper identity and access management 0C Can you answer the question which employee has what type of authorization? Have you already thought about how costs for user accounts and the corresponding licenses that are no longer used could be reduced? do you have an established it service catalog so that users can quickly and conveniently find required user accounts? did you ensure that you can obtain an overview of the current assignment of authorizations and user accounts at any time and with little effort? Have you already thought about how your IT organization could become more efficient through automation? do you ensure that an access right exists only as long as it is actually necessary? Can you retrace who initiated requirements and changes and approved them? Are measures in place to verify and document which person has access to which systems and when and why and how?
whitepaper identity and access management 02 syscovery savvy suite Area of application service lifecycle management identity and access management your challenges An IT strategy oriented towards the challenges of the market and the needs of the customer leads to an increasing complexity within information technology (IT). At the same time, it must be ensured that laws and directives in the context of IT compliance are adhered to. A dynamic IT management that continuously adapts to new challenges requires a solution in the area of managing identities and authorizations. It excels through flexibility and a holistic approach and ensures transparency and security within the IT landscape. Mastering and controlling the relevant processes for managing identities, authorizations and user accounts are central factors for success. Companies have to merge organizational changes with the basic IT infrastructure in an optimal and efficient way. Beginning with processes that have their origin in human resources starting with employees joining a company via changes such as organizational shifts up to employees leaving a company the goal is to supply the employee with the required authorizations in the best possible way using efficient processes in IT. At the same time, this solution has to sustainably meet the legal requirements from the areas of IT security and IT compliance. The increasing dependency of employees on the use of information technology illustrates that the provisioning of identities and authorizations within IT systems has a direct influence on the company s success and performance. Processes for identities, user accounts and access rights that are controlled in an efficient and automated way are a central build ing block for lasting success in this context. For this purpose, we are offering a solution with the syscovery Savvy Suite that is described in more detail on the following pages.
our solution at a glance With the syscovery Savvy Suite, we are offering a software platform that efficiently maps the different lifecycles of identity and access objects in the company and allows designing a transparent and secure identity and access lifecycle management. The syscovery Savvy Suite integrates HR processes and, if required, supplements them with the management of additional groups of persons, such as external employees, to provide a universally applicable database for downstream IT processes. Using modular processes and simple sets of rules, defined processes are controlled by the syscovery Savvy Suite based on changes to an employee, such as requests or cancellations of user accounts or the assignment of authorizations. In this context, a high level of process automation contributes significantly to reducing the load on IT. our integration model Employee hiring Employee leaving Organizational change Change of location and others business process overview hr system Persons User accounts Organizational Groups and others identity and access management identity lifecycle access lifecycle Target system accounts Technical roles Authorizations Authorization groups File structures and others technical identity and access management it infrastructure * system landscape ** Using a holistic view of identities, authorization and user accounts allows creating an environment that provides the employee as well as the IT organization with a central and transparent platform for the control and maintenance of employee-relevant data. * applications, target systems ** SAP Software, Active Directory, VMware, Linux and others
whitepaper identity und access management 04 our function blocks identity lifecycle management How can you ensure that your employees are ready to work as soon as possible after joining your company? Where can user accounts be centrally maintained for all types of systems? And how are external employees being managed? While HR systems primarily involve the purely contractual aspects of internal employees, extended views of the employees are becoming more and more important in order to be able to make the correct decisions within the business processes of a company. In the syscovery Savvy Suite, aggregated business roles as well as individual authorizations for the employees themselves or via a third party are made available for request placement. A dynamic catalog ensures that employees can view only the set of authorizations that matches them. Questions such as who authorized a user account, which employee has which accounts and how can it be ensured that an account is disabled if an employee changes departments or even leaves the company, can quickly and reliably be answered using the syscovery Savvy Suite. For this purpose, the syscovery Savvy Suite integrates itself into existing HR processes and offers added value such as maintenance of advanced personal data or the complete management of external employees. Access Lifecycle Management How can employees in an active business environment be optimally supported in their daily operative work and, at the same time, pay attention to the need of the company management for data security and cost reduction? Alongside the management of people, the issue of user accounts plays a central role in security and transparency. Defined business processes implement the lifecycles and ensure that the correct approval configuration is always granted and the corresponding target systems are being addressed. For this purpose, the syscovery Savvy Suite stores who authorized what and when and presents the employee with an overview of his own authorizations or the status of his change requests and all of it in a revision-proof way. Those in charge receive a quick overview of assigned authorizations and user accounts within their divisions. This represents a basis for initiating additional actions, such as the cancellation of authorizations. Extensive searches across authorizations or user accounts within the system landscape are a thing of the past with the syscovery Savvy Suite. Recertification Have you already thought about how costs for user accounts that are no longer used and the corresponding licenses could be reduced? While the cyclical certification of external employees is at the forefront in Identity Lifecycle Management, the recertification in the Access Lifecycle Management area ensures that any security holes are closed and costs for licenses and user accounts can be reduced. Access rights have to be recertified based on individual guidelines, while the employee continues to be operational at all times. Security-relevant administration accesses are subject to different intervals and rules than standard user accesses. The interval by which such a recertification is governed, can be adjusted individually just like the linking of the follow-up processes with the recertification. Besides closing security holes by canceling accesses and authorizations that are no longer needed, it is also possible to realize significant cost potentials in the area of licenses. Self-Service Do you have an established IT service catalog so that (end) users can quickly and conveniently find required user accounts and authorizations? The syscovery Savvy Suite moves your employees to the center with its self-service philosophy. They are actively integrated into all processes via web dialogs, whether they initiated them themselves because
Screenshot syscovery Savvy Suite they know their own requirements best, or because they are transparently informed about different process steps at all times, such as pending approvals. The syscovery Savvy Suite offers you a dynamic service catalog that enables your employees to request specific user accounts, authorizations or other IT services. The service catalog takes the application context into consideration. Whether a service can be requested for an external employee, at a specific location or for different subsidiaries is taken into account as well as existing authorizations. Financial Management How can the costs of IT be lowered proactively and how can costs for user accounts and licenses be charged under the causation principle? How can IT exert an influence on the fact that user accounts or authorizations, which have been assigned once, can be canceled, if the demand no longer exists? Costs for user accounts or licenses in conjunction with accesses are divided among the respective service users directly to the cost centers via an internal service costing. Own views allow persons in charge of cost centers to gain an overview over the development of their current IT costs, whether it concerns licenses in use, user accounts or the basic IT equipment of their employees. This leads to transparency and cost awareness. Reporting How many accesses were ordered, canceled or extended in the last month? How can an overview of the current assignment of authorizations and user accounts be generated within the system landscape with little effort at any given time? How many licenses is the company currently using? The syscovery Savvy Suite uses process analyses and the corresponding lifecycles to provide not only the required data, but also processes them accordingly using graphical reports. As it is usual within the syscovery Savvy Suite, the role-based access concept also applies here so that every employee will be shown only the data within his area of responsibility.
whitepaper identity und access management 06 the syscovery savvy suite The syscovery Savvy Suite is an IT business management and governance software that not only enables IT processes, but it also makes them simple and secure by closing the hole between the requirements of business and the service offer of the IT departments. Savvy means well informed, perceptive, shrewd. In this sense, the best procedures and findings for mapping lifecycles within IT have been combined in the syscovery Savvy Suite. The syscovery Savvy Suite helps your company to utilize potentials in the areas of efficiency and quality increase as well as cost optimization and to significantly increase customer satisfaction while simultaneously increasing reliability. The modular design of the syscovery Savvy Suite makes it possible to adapt the scope of services optimally to your individual requirements and attain a comprehensive integration into your existing system environment. As a web-based application, the syscovery Savvy Suite represents a central portal for employee interaction in the context of IT services. By mapping a comprehensive identity and access management, the syscovery Savvy Suite enables you to control your processes and to handle it efficiently, transparently and securely over its service life. advantages of a solution with the syscovery savvy suite New employees gain quicker access to required systems and authorizations. Idle times are minimized. Existing employees can work optimally through the mapping of rules and processes within different lifecycles. Security-relevant changes are taken into account. For employees leaving the company, user accounts are automatically deactivated and authorizations are removed. Security holes are avoided, licensing costs are reduced. Cyclical recertification processes ensure that your IT meets the appropriate security requirements. Reduction of manual effort for setting up and maintaining authorizations and user accounts. This creates space and time for more important tasks. Security guidelines and specifications by company management can be mapped holistically. The result is transparency, and requirements for future audits can be met.
If you have any questions, we are looking forward to hearing from you via phone or e-mail. We would gladly take the time to provide answers and support. syscovery Business Solutions GmbH Am Römischen Kaiser 7 67547 Worms Germany phone +49 6241 940 90 28 savvysuite@syscovery.de www.syscovery.de