Terrorist Sabotage Theft Credit Card Fraud Theft Corporate Malfeasance HCL Information Security Practice
Why to go for IAM? Terrorist sabotage. theft. Credit card fraud. Corporate malfeasance. Privacy violations. Many critical problems facing society today involve unauthorized access to, use of personal other confidential data. Managing users' identities entitlements has become increasingly complex as enterprises allow employees, contractors, partners, suppliers customers access to their systems information. At the same time, enterprises have been under increasing pressure to ensure that they manage users' identity access in compliance with new legislation regulation be able to demonstrate that they do so. Moreover, the dems of regulatory compliance are driving corporate IT security managers to improve their process for governing user access. What is keeping them awake most of all, however, is not just regulatory compliance but the entire array of serious problems that can result from their inability to see who has access to which information resources, to manage access change as user job responsibilities change, to maintain audit trails, to ensure that all users have access that is appropriate for their job function. From our experience various customer engagements we can state that most of the customers are looking at IAM to be more "Business Agile", increase their "Operational Business efficiency" to stay "Compliant". It is imperative that enterprises initiate, develop define ongoing IAM programs. They must then continuously improve then maintain the maturity of these programs over time. Defining a streamlined, automated stardized enterprise-wide identity management program comes with its set of challenges such as Adopting a business oriented approach Protecting sensitive data maximizing the efficiency of critical business processes Balancing investments in these systems while improving operational efficiency Design of effective control mechanism supported by sufficient reporting documentation Timely implementation of solutions to adhere to compliance requirements Tackling these challenges requires clear understing of the business as well as the complex IT environment characteristic of global enterprises. The first key to success is recognizing that identity management is a process not technology or a software product. HCL s significant understing of both business as well as technology makes it an ideal partner to help create business-relevant road maps solutions to address an enterprises identity access management needs. Our IAM practice has developed methodologies for helping enterprises comply with rigorous compliance deadlines without compromising efforts implementing their strategic road map.
HCL Governance Integration/ Development Directory Compliance, Auditing & Migration Managed Architecture/ Advisory Life Cycle Asset Provisioning Centralized Role Attestations Work Flow Design Implementation Web Enterprise Single Web Single Federation Role Based Control OS Control Remote Session Single Auditing of Sessions Role Engineering Modeling SoD Compliance Assurance Entitlement Certification Multi Factor Adaptive Out Of B Brokerage Managed HCL s IAM Practice covers Risk based Compliance Implementation, User Provisioning Administration,, Password, Web Enterprise Sign-on, Directory, Federated, Strong Risk Based, Segregation of Duties, Role Based Role Engineering, Web Security.
Our Approach Senior management key stakeholders have a clear cut need to underst the long-term strategy for identity access management. IAM solutions can help transform the enterprise to a quickly changing enterprise if implemented properly. Hence it is important to underst that to reduce failures in an IAM program, strategy planned implementation plays a major role. HCL s IAM Practice has defined a well thought out delivery cycle for an IAM program as shown below: Consulting Architecture design Foundation Build testing Production Rollout Life cycle support IAM Consulting Project Quality IAM Solution CoE s User Life Cycle & Entitlements User Audit Compliance It s clear that IAM projects require considerable planning project management expertise, with a project team representing various stakeholders within the company. Most notably, like virtually any large IT project, IAM requires strong sponsorship from senior company management, who must underst the business benefits the technology can bring. And everyone involved needs to underst that, to live up to their full potential, IAM solutions require regular care feeding long after the initial go-live date, which means planning for follow-up optimizations is crucial as well. HCL s experienced consultants use the structured approach to help the organization assess, design, implement, manage monitor an effective identity access management program drive key customer benefits like the following: Ÿ IAM Roadmap consulting Ÿ IAM Implementation Ÿ Integration development services Ÿ Migration services Ÿ Managed Ÿ Key IAM Deliverables Ÿ Process Automation optimization Ÿ Governance Ÿ Audit Compliance reporting Ÿ Role Based Ÿ Single Federation Customer Benefits Ÿ Improved end-user experience Ÿ Scalability Integration Ÿ Improved Operational efficiency Ÿ Reduced Administrative Costs
HCL Credentials Key Differentiators Ÿ More than 25 customers worldwide have gained from HCL s IAM expertise in various stages of their IAM new transformational projects Ÿ Availability of more than 700+ pool of expertise having diversified understing of Security domain including consulting, implementation, development operations CoE Ÿ Highly scalable labs for products, PoC s, trainings innovations Ÿ Innovation-focused to support highly scalable solutions Ÿ Global partnership with key product vendors for offering joint solutions Large pool of IDAM experts Functional Delivery Excellence Model Ÿ Architects security consultants with multiple project experience Ÿ Large development pool to address IDAM customizations integrations Ÿ Increased Customer Satisfaction by 43% - CSAT Survey 2009 Ÿ Quadrupled the Number of Customers Ÿ $5mn+ & $10mn+ Customers Grew by 4x Ÿ $20mn+ Customers Grew by 5x Case in Discussion: Asia s largest Stock Exchange