SlideShare a Scribd company logo
1 of 36
Download to read offline
MT 42 Ensuring the success of
your IAM project
What is your IAM
project?
“Superusers”Mobile users
Customer dataYour IP
IAM is critical… to protect people and things
Your systems
User access
But why?
Why do you want to protect these things?
• You have some really valuable stuff.
• Your users want what they want, when they want it, and it better be easy.
• Someone says you have to do it.
• Bad people are out there.
• Good people aren’t perfect.
• You don’t want to have a security breach.
It’s just the right thing to do.
So you engage in
an IAM project
(in one guise or another).
Top reasons we see IAM projects stall.
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
• A manual process for provisioning Active Directory with native tools
• A highly customized provisioning framework for the rest of the enterprise
• A purchased solution for authentication to federated applications
• A home-grown solution for authentication to internally-developed applications
• Another purchased solution for single sign-on to legacy applications
• A manual process for privileged password management
• A dedicated Active Directory bridge for some Unix/Linux privileged account
management tasks
• A self-service solution for resetting user passwords
Document management company
• IAM framework for provisioning
• Another solution for PAM
• Another for AD management
• Another for single sign-on
• Another for password management
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
An IAM framework that…
• Doesn’t do everything you need
• Maintains complexity
• Has made your org six years into the three-year IAM deployment
• Demands a constant stream of consultants and developers
• Has provided unfulfilled expectations
• When requirements change, it starts all over again
• “Traditional” IAM framework
• 16 full-time Java developers
• Two years in
• Provision 1 app (AD)
• Can’t de-provision anything
Fortune 100 company
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
• How cumbersome are your “automated” processes?
• Are you actually provisioning everything you need?
• Who’s driving the bus, the business or IT?
• Governance: Attestation/re-certification
• Sun IAM framework
• Basic provisioning not up to par
• No access request
• No governance
• 3+ years to get to this point
Oil & gas company
All of them end with the same consequences…
• Inefficiency
• Audit exposure
• Inflexibility
• Cost overrun
Ultimately a project which
did not deliver as per the
expectations!
A recipe to make your
IAM project a success
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
Management
Control
Security
Access
Governance
Hierarchy of IAM needs
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Failed Novell and Oracle deployments
required three full-time staff just for
provisioning.
• Redirect staff to strategic IT initiatives.
• 18 weeks to value.
• Governance included.
Technology company
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Phase one deployment in 14 weeks
• Self-service access request
• Immediately automated 50% of
provisioning tasks
• Governance included
• Phase two underway
Oil & gas company
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Evolving environment (mergers)
required improvement over
manual provisioning processes
• Governance required including
data
• Reduced cost of compliance
• Drive identity from HR system
• Extend to students, staff, and
volunteers
Healthcare organization
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Modular and integrated approach to
augment IAM framework
• AD management and extend to Unix
• Privileged account management
• Single sign-on and federation
• Self-service password reset
• Finally replace custom framework with
unified provisioning and governance.
Document management company
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
• Provision AD also provisions Unix
access
• Went from 12 Unix passwords to 1 AD
password
• Eliminated a $1M/month helpdesk bill
• Framework customization no longer
required for Unix IAM
Major bank
So, where can you
turn for help?
All of them end with the same consequences…
• Focus on what matters the most
to you and your organisation
• Include external systems where
possible
• Build the team of experts
Remember IAM is
about bringing
business agility as
well as managing risk!
Protect Comply Enable
security for better .
User – Identity and Access Management
Endpoint
(Data center – edge)
Network
(Perimeter and beyond)
Data and Application
(On-premises – cloud)
Managed Security Services Security Intelligence and Response
Strategically connect solutions to enable better outcomes
Better security for better business.
Why work with Dell
The path to
governance
• Policy-based
access control
• Governance for
identities, user
access, data and
elevated access
• Privileged
account
lockdown
Business driven
• User and line-of-
business self-
service
• Unified policy,
identity and
workflow
• Complete
visibility and
control
Future-ready
• Configure, don’t
code
• Adapt to meet
changing
organizational
needs
• Minimize the shock
of constantly
changing
employee roles
Modular and
integrated
• Doesn’t demand
a rigid framework
• Start anywhere
and build from
there
• Easily plugs into
existing tools and
solutions
Rapid time to
value
• Deploy initial
functionality
quickly
• Streamline and
automate tasks
• Meet existing
business
processes
Thanks!
Jackson.shaw@software.dell.com
eBook: Future-ready IAM at http://dell.to/1JHdVOE
software.dell.com/IAM

More Related Content

What's hot

Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice Corporation
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsIvanti
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...Dell EMC World
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365Martin Pietrzak
 
DevOps Transformation Approach - Addteq
DevOps Transformation Approach - AddteqDevOps Transformation Approach - Addteq
DevOps Transformation Approach - AddteqAddteq
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?Avtex
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the CloudIvanti
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??TechSoup
 
Cloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integratorsCloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integratorsLiubov Belousova
 
Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowTechSoup
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksMarcoTechnologies
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologyCisco Canada
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 

What's hot (20)

Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
DevOps Transformation Approach - Addteq
DevOps Transformation Approach - AddteqDevOps Transformation Approach - Addteq
DevOps Transformation Approach - Addteq
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??
 
Beka Technology
Beka TechnologyBeka Technology
Beka Technology
 
Cloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integratorsCloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integrators
 
Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to Know
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 

Viewers also liked

User Manager
User ManagerUser Manager
User ManagerEmpowerID
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developersMario Cardinal
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
MarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographicMarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographicSandy Halse DipM ACIM
 
Www.rabattakku.com acer.html
Www.rabattakku.com acer.htmlWww.rabattakku.com acer.html
Www.rabattakku.com acer.htmlrestorationsder
 
Storage user cases
Storage user casesStorage user cases
Storage user casesAndrea Mauro
 
Business Continuity & Storage
Business Continuity & StorageBusiness Continuity & Storage
Business Continuity & StorageAndrea Mauro
 
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel PartnersDell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel PartnersDell World
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Dell vision and solutions
Dell vision and solutionsDell vision and solutions
Dell vision and solutionsAndrea Mauro
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...dreamforce2006
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 

Viewers also liked (20)

User Manager
User ManagerUser Manager
User Manager
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
MarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographicMarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographic
 
Www.rabattakku.com acer.html
Www.rabattakku.com acer.htmlWww.rabattakku.com acer.html
Www.rabattakku.com acer.html
 
Storage user cases
Storage user casesStorage user cases
Storage user cases
 
Business Continuity & Storage
Business Continuity & StorageBusiness Continuity & Storage
Business Continuity & Storage
 
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel PartnersDell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel Partners
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Dell vision and solutions
Dell vision and solutionsDell vision and solutions
Dell vision and solutions
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
The dell model
The dell modelThe dell model
The dell model
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Salesforce Partner Program
Salesforce Partner ProgramSalesforce Partner Program
Salesforce Partner Program
 

Similar to The Keys To A Successful Identity And Access Management Program: How Does Your Approach Compare To Industry Best Practices?

cloud session uklug
cloud session uklugcloud session uklug
cloud session uklugdominion
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...LINE Corporation
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksAppDynamics
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentQuest
 
Oracle IAM |Tangenz Corporation
Oracle IAM |Tangenz CorporationOracle IAM |Tangenz Corporation
Oracle IAM |Tangenz CorporationAliceJonson
 
(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects
(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects
(SPOT205) 5 Lessons for Managing Massive IT Transformation ProjectsAmazon Web Services
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix HeroeG Innovations
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQServiceRocket
 
Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesScalr
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
Infrastructure for SaaS Applications
Infrastructure for SaaS ApplicationsInfrastructure for SaaS Applications
Infrastructure for SaaS ApplicationsEjaz Siddiqui
 
IBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor PerryIBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor PerryFresche Solutions
 
Jason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdfJason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdfAWS Chicago
 

Similar to The Keys To A Successful Identity And Access Management Program: How Does Your Approach Compare To Industry Best Practices? (20)

cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
 
Oracle IAM |Tangenz Corporation
Oracle IAM |Tangenz CorporationOracle IAM |Tangenz Corporation
Oracle IAM |Tangenz Corporation
 
(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects
(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects
(SPOT205) 5 Lessons for Managing Massive IT Transformation Projects
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
 
Neuranet.pptx
Neuranet.pptxNeuranet.pptx
Neuranet.pptx
 
Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdles
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Infrastructure for SaaS Applications
Infrastructure for SaaS ApplicationsInfrastructure for SaaS Applications
Infrastructure for SaaS Applications
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
 
IBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor PerryIBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor Perry
 
Jason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdfJason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdf
 
Seamless erp
Seamless erpSeamless erp
Seamless erp
 

More from Dell World

Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyDell World
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioDell World
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDell World
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Dell World
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Dell World
 
Channel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutionsChannel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutionsDell World
 

More from Dell World (20)

Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?
 
Channel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutionsChannel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutions
 

Recently uploaded

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 

Recently uploaded (20)

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 

The Keys To A Successful Identity And Access Management Program: How Does Your Approach Compare To Industry Best Practices?

  • 1. MT 42 Ensuring the success of your IAM project
  • 2. What is your IAM project?
  • 3. “Superusers”Mobile users Customer dataYour IP IAM is critical… to protect people and things Your systems User access
  • 5. Why do you want to protect these things? • You have some really valuable stuff. • Your users want what they want, when they want it, and it better be easy. • Someone says you have to do it. • Bad people are out there. • Good people aren’t perfect. • You don’t want to have a security breach. It’s just the right thing to do.
  • 6. So you engage in an IAM project (in one guise or another).
  • 7. Top reasons we see IAM projects stall. • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 8. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 9. Sound familiar? • A manual process for provisioning Active Directory with native tools • A highly customized provisioning framework for the rest of the enterprise • A purchased solution for authentication to federated applications • A home-grown solution for authentication to internally-developed applications • Another purchased solution for single sign-on to legacy applications • A manual process for privileged password management • A dedicated Active Directory bridge for some Unix/Linux privileged account management tasks • A self-service solution for resetting user passwords
  • 10. Document management company • IAM framework for provisioning • Another solution for PAM • Another for AD management • Another for single sign-on • Another for password management
  • 11. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 12. Sound familiar? An IAM framework that… • Doesn’t do everything you need • Maintains complexity • Has made your org six years into the three-year IAM deployment • Demands a constant stream of consultants and developers • Has provided unfulfilled expectations • When requirements change, it starts all over again
  • 13. • “Traditional” IAM framework • 16 full-time Java developers • Two years in • Provision 1 app (AD) • Can’t de-provision anything Fortune 100 company
  • 14. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 15. Sound familiar? • How cumbersome are your “automated” processes? • Are you actually provisioning everything you need? • Who’s driving the bus, the business or IT? • Governance: Attestation/re-certification
  • 16. • Sun IAM framework • Basic provisioning not up to par • No access request • No governance • 3+ years to get to this point Oil & gas company
  • 17. All of them end with the same consequences… • Inefficiency • Audit exposure • Inflexibility • Cost overrun Ultimately a project which did not deliver as per the expectations!
  • 18. A recipe to make your IAM project a success
  • 19. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 20. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 22. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 23. • Failed Novell and Oracle deployments required three full-time staff just for provisioning. • Redirect staff to strategic IT initiatives. • 18 weeks to value. • Governance included. Technology company
  • 24. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 25. • Phase one deployment in 14 weeks • Self-service access request • Immediately automated 50% of provisioning tasks • Governance included • Phase two underway Oil & gas company
  • 26. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 27. • Evolving environment (mergers) required improvement over manual provisioning processes • Governance required including data • Reduced cost of compliance • Drive identity from HR system • Extend to students, staff, and volunteers Healthcare organization
  • 28. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 29. • Modular and integrated approach to augment IAM framework • AD management and extend to Unix • Privileged account management • Single sign-on and federation • Self-service password reset • Finally replace custom framework with unified provisioning and governance. Document management company
  • 30. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 31. • Provision AD also provisions Unix access • Went from 12 Unix passwords to 1 AD password • Eliminated a $1M/month helpdesk bill • Framework customization no longer required for Unix IAM Major bank
  • 32. So, where can you turn for help?
  • 33. All of them end with the same consequences… • Focus on what matters the most to you and your organisation • Include external systems where possible • Build the team of experts Remember IAM is about bringing business agility as well as managing risk!
  • 34. Protect Comply Enable security for better . User – Identity and Access Management Endpoint (Data center – edge) Network (Perimeter and beyond) Data and Application (On-premises – cloud) Managed Security Services Security Intelligence and Response Strategically connect solutions to enable better outcomes Better security for better business.
  • 35. Why work with Dell The path to governance • Policy-based access control • Governance for identities, user access, data and elevated access • Privileged account lockdown Business driven • User and line-of- business self- service • Unified policy, identity and workflow • Complete visibility and control Future-ready • Configure, don’t code • Adapt to meet changing organizational needs • Minimize the shock of constantly changing employee roles Modular and integrated • Doesn’t demand a rigid framework • Start anywhere and build from there • Easily plugs into existing tools and solutions Rapid time to value • Deploy initial functionality quickly • Streamline and automate tasks • Meet existing business processes
  • 36. Thanks! Jackson.shaw@software.dell.com eBook: Future-ready IAM at http://dell.to/1JHdVOE software.dell.com/IAM