Professional Documents
Culture Documents
Agenda:
Market Trends:
1. Growing Market Security Awareness
2. Regulatory Pressure
Trend #3:
The use and amount of
data in enterprises has
increased exponentially
Business Challenges
Business Drivers
Regulatory
Compliance
Reliable
deactivation.
Strong
Authentication.
Appropriate
security
entitlements
IT Support Costs
Service / SLA
Helpdesk Call
Volume
Time/Effort to
manage access
rights.
Faster OnBoarding
Simpler
Request /
Approval
process
Reduce burden
of too many
login prompts
and passwords
Provisioning
Access Management
is the process of regulating access to information
assets by providing a policy-based control of who
can use a specific system based on an
individual's role and the current role's permissions and
restrictions
De-Provision
IAM
Report and Audit /
Reconcile
Enforce/Access
Review
IT Security Basics
Whos who , Whats What & Who has access to What
ACCESS
ACCESS
Employee
Partners
Customers
Suppliers
Anyone
Databases
Folders
Cloud Storage
Portals
Cloud Applications
On-premise Applications
ENTITLEMENT CATALOG
Analyst View
INNOVATION LEADER
Accreditation @ IDA
What this mean to Deep Identity:
Green lane - The Government procurement process has been
streamlined to allow accredited companies to be considered first by
Government agencies.
Increase the visibility of accredited companies
Match government lead demand with innovative supply.
http://www.ida.gov.sg/Collaboration-and-Initiatives/Initiatives/Store/Accreditation-IDA
Solution Overview
Side-Benefits.
Security aspect is one thing.
Types of Reports:
Last Login
Last Password Change
How many functions / modules they are using?
Compliance Management
IACM provides out-of -the box policy templates for enterprises to perform
compliance check. Such checks include:
Risk scoring includes the ability to automatically assign risk typically low,
medium and high.
Complex risk scoring is based on user role assignment, user behavior and
compliance violations.
Compliance Lifecycle
Compliance Management
Integrated SoD & GRC Solutions
Across SAP
& third party
Applications
Detailed SoD
Checks across
Users, Profiles,
Roles & TCODEs
Across App,
DB and OS
Support
Cloud-based
Applications
Across All
SAP Modules
& Environment
Identity Manager
Deep IM
Registration
Profile Administration
Password Reset/Account Unlock
Self-service Attestation
Identity Manager
Identity Portal for iOS and Android Phones
Identity Manager
Identity Portal for iOS and Android Phones
Architecture
Solution Architecture
VM / Deployment Architecture
Security Architecture
Business Benefits
Challenges:
User management provision and reconciliation are independent for different target systems and applications. Its hard and
time consuming for the unified user management.
Provide the visibility of the current and existing user profiles.
Provide a centralized repository of users being provisioned upon.
Compliance reporting functionality cant generate compliance-driven reports.
Business Benefits:
Deep Identity understands the current tedious, and labour-intensive manual process for provisioning and deprovisioning of employees - which are time-consuming, costly and can be prone to error.
These manual processes generally result in loss of productivity, lack of audit trail, and could potentially pose
security risk to our customer.
Benefits
Have centralized and automated application which will perform the provisioning and access
review tasks, thus simplifies user administration and provides security for the data.
User Tracking
Have centralized application which will be able to present current and existing users and their
respective access to different target systems.
Compliance Reports
Have a tool which will be able to generate compliance-driven reports, meeting compliance
reporting needs. Comply with SoD and GRC regulations.
Have a centralized repository which will store all users information to offer different applications
or systems with this centralized user repository as the basis of authorization.
Enhanced User
Experience
Increased
Productivity
Improved
Efficiency
Self-service web
portal to view self
access rights,
request for a new
access right, create
a new group, etc.
Email notifications
whenever there is
any actions
required
Default system
access to be given
to new joiners on
Day One
Enforcement of
Segregation of
Duties policies,
within and across
applications
Reduced
turnaround time
to provision new
access upon
request
IBM
CA Technologies
Novell
Oracle
Dell
Niche Players
Sailpoint
Aveksa
Courion
CrossIdeas
Cloud Players
Okta
ForgeRock
Compliance/GRC Players
SAP GRC
Archer
Competitive Differentiator
Features and functionality against leaders in the market
Value Add/Differentiator
Product Roadmap
Integrated Identity, Access & Data Governance Suite (V5)
Identity
Governance
& Administration
Access
Management
Data Governance
Web
Single
Sign-On
Data
Governance
Manager
Identity
Manager
XACML/ABAC
Entitlement
Server
Data
Crawler
Privilege
Identity
Manager
Deep Identity
TACACS+
Connectors Roadmap
DI Connectors
OS
Win
Unix
Telnet/SSH
DIRECTORIES
AD
AD Cloud Sync
Data storage
devices
Mail/collab systems
MS SQL
Windows
Exchg Server
Oracle
EMC
My SQL
SharePoint
Server
DB
Password Filter
IBM
IBM Z/OS
AS/400
Generic LDAP
V2&V3
DB App Table
LNS Domino
Google Usr
Mgmt.
ERP
SAP EP
Oracle
eBusiness Suit
Oracle
PeopleSoft Usr
Mgmt.
FTP
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
AD
LNS
SAP EP
SAP User Management
SAP HRMS
Windows
Unix
MS SQL
Oracle 11g/12c
Exchange server
ERP > Oracle eBusiness Suit
ERP> Oracle people soft user management
HRMS > Oracle PeopleSoft
HRMS > Oracle eBusiness suit user management
Portals
SharePoint
CLOUD/Third Party
Integration
IBM WebSphere
MQ
Web Services/API
SPML
SCIM
Cloud Application
Office 365
HRMS/TS ER
Privilege User
Management
SAP HRMS
Xceedium
Google Usr
Mgmt
Oracle PeopleSoft
Salesforce Usr
Mgmt.
Oracle eBis
Suite usr Mgmt
Off-Line/FlatFile Recon
Workday
CyberArc
Summary
Lightweight
- Most Lightweight Solution & Lower TCO
- Agentless
Call to Action.
THANK YOU!