SlideShare une entreprise Scribd logo
1  sur  21
Identity & Access Management




                                                  Jan Quach & Aditya Jayanthi
                                                  Information Security Services



Copyright © 2012 Accenture All rights reserved.                                   1
Agenda

•     We are…
•     It all started…
•     Vision
•     Approach
•     Journey
•     So far, so good
•     What’s in it for you




Copyright © 2012 Accenture All rights reserved.   2
We are VELUX and Accenture
The VELUX Group

•     Established in 1941
•     Approx. 10000 employees globally
•     2600 in Denmark
•     Sales companies in almost 40 countries
•     Production companies in 11 countries
•     Head office in Hørsholm, Denmark
•     Owned by VKR Holding, a limited
      company wholly owned by foundations
      and family
•     VKR Holding turnover 17,8 billion. DKK
      in 2010.
•     One of the strongest global brands in
      the building materials industry
•     Name and brand registered in almost
      100 countries

Copyright © 2012 Accenture All rights reserved.   4
Accenture

•     Global management consulting,
      technology services and outsourcing
      company
•     Globally more than 244.000 people
•     Operating in more than 120 countries
•     Turnover US$25,5 billion in FY 2011


Security Practice
•     Over 1800 security professionals
•     Represented in more than 55
      countries
•     Servicing over 250 clients

Copyright © 2012 Accenture All rights reserved.   5
Cooperation

•     VELUX has outsourced IT-
      application and infrastructure
      management to Accenture

•     Accenture delivers advisory
      services to VELUX

•     Accenture started working
      with VELUX to define IAM as
      part of overall outsourcing
      deal



Copyright © 2012 Accenture All rights reserved.   6
It started with…
Why I&AM?

•     Inefficient onboarding processes
•     Inconsistent identity data
•     Compliance (Audit findings)
•     Labor intensive processes


                                       = Good foundation for I&AM




Copyright © 2012 Accenture All rights reserved.                     8
Vision
Vision

1.      One common corporate identity for each employee or other
        associated person
        •        Ensure that all data related to one identity are linked which will heighten the usability and remove sources of
                 error



2.      Global consistent joiner/mover/leaver process
        •        Save time and resources for the managers and support functions and reduce obstacles and sources of error



3.      Transparency of valid identity data
        •        Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will
                 improve risk management capabilities



4.      Agile identity handling and access management
        •        Use automation to reduce time to execute and minimize errors.




Copyright © 2012 Accenture All rights reserved.                                                                                 10
Approach
Approach

1.      Define the vision, high-level strategy and roadmap
        •        Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy
                 for implementation that is aligned with business goals across departments



2.      Choose the right technology partners
        •        Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape



3.      Implement a proof-of-concept
        •        To goal is to demonstrate capabilities that are relevant for business in specific organizational setting



4.      Focus on continuous benefit realization with flexible
        implementation
        •        Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale
                 implementations with distinct benefit realizations model




Copyright © 2012 Accenture All rights reserved.                                                                              12
Journey
Journey

1.      Capability assessment and workshops with key stakeholders
        •        Goal was to identify the key areas of improvement and pain points
        •        To introduce the concept to key stakeholders and align the business support



2.      Vendor selection and proof-of-concept
        •        Ensure we chose a vendor and not just a product
        •        Developed a PoC based on multiple scenarios



3.      Focus on quick wins to get program off the ground
        •        Implemented projects that had quick and visible impact
        •        Proactively focused on areas where IAM is the enabler for implementing better process



4.      Aligned with overall IT strategy direction
        •        Be flexible in implementation approach
        •        Align with overall direction of IT strategy to ensure ongoing support




Copyright © 2012 Accenture All rights reserved.                                                          14
So far, so good
Benefit Realization

•      Implemented enterprise level services
•      Consistent processes that are easy to adopt
•      Improved compliance
•      Greater flexibility to adopt new opportunities



                                             The story has just begun




Copyright © 2012 Accenture All rights reserved.                         16
What s in it for you
Do’s

•     Top-level Management support is essential

•     Broad organizational involvement

•     Communication at the right level

•     Risk Management

•     Legal Matters




Copyright © 2012 Accenture All rights reserved.   18
Don’ts

 •      Treat I&AM as an IT-project

 •      Aim too high

 •      Promise too much, things take time

 •      Underestimate the “organizational change” aspect

 •      Put I&AM as secondary task, it is a large coordination
        project




Copyright © 2012 Accenture All rights reserved.              19
Thanks for listening!
Contact information       Contact information
Jan Quach                 Aditya Jayanthi
Accenture                 Accenture
jan.quach@accenture.com   aditya.k.jayanthi@accenture.com
Comments or Questions?
  Come see the Security Systems Team
          in the Expo area:


    Jesper Glahn       Marcus Eriksson                    Sven-Erik Vestergaard
Denmark Sales Leader   Sales Leader, ISS   Sara Anwar
                                                            Security Architect
                           & Qradar        Nordic Sales

Contenu connexe

Tendances

Reimagining Minnesota State Emerging Themes
Reimagining Minnesota State Emerging ThemesReimagining Minnesota State Emerging Themes
Reimagining Minnesota State Emerging ThemesMSCSA
 
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc..."Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...Sustainable Business Partnership
 
The UN Global Compact-Accenture CEO Study on Sustainability 2013
The UN Global Compact-Accenture CEO Study on Sustainability 2013The UN Global Compact-Accenture CEO Study on Sustainability 2013
The UN Global Compact-Accenture CEO Study on Sustainability 2013Sustainable Brands
 
Accenture sustainability academy_overview
Accenture sustainability academy_overviewAccenture sustainability academy_overview
Accenture sustainability academy_overviewAndy Green
 
The Consumer Study: From Marketing to Mattering, Generating Business Value by...
The Consumer Study: From Marketing to Mattering, Generating Business Value by...The Consumer Study: From Marketing to Mattering, Generating Business Value by...
The Consumer Study: From Marketing to Mattering, Generating Business Value by...Sustainable Brands
 
Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Victor Gridnev
 
Risk taking in SME's
Risk taking in SME'sRisk taking in SME's
Risk taking in SME'sBrian Stevens
 
The "Death" of the Business Plan
The "Death" of the Business PlanThe "Death" of the Business Plan
The "Death" of the Business PlanChris Catto
 
Advancing Research: Double Your Mileage
Advancing Research: Double Your MileageAdvancing Research: Double Your Mileage
Advancing Research: Double Your MileageNathan Shedroff
 
Analytics for manufacturers: The three-minute guide
Analytics for manufacturers: The three-minute guideAnalytics for manufacturers: The three-minute guide
Analytics for manufacturers: The three-minute guideDeloitte United States
 
UN Global Compact—Accenture CEO Study on Sustainability
UN Global Compact—Accenture CEO Study on SustainabilityUN Global Compact—Accenture CEO Study on Sustainability
UN Global Compact—Accenture CEO Study on Sustainabilityaccenture
 
Driving High Performance Through Finance Workforce Mastery
Driving High Performance Through Finance Workforce MasteryDriving High Performance Through Finance Workforce Mastery
Driving High Performance Through Finance Workforce Masterycjazh
 
Escape the roundabout: A data-driven path to partnerships
Escape the roundabout: A data-driven path to partnershipsEscape the roundabout: A data-driven path to partnerships
Escape the roundabout: A data-driven path to partnershipsMeghan Ennes
 

Tendances (20)

Reimagining Minnesota State Emerging Themes
Reimagining Minnesota State Emerging ThemesReimagining Minnesota State Emerging Themes
Reimagining Minnesota State Emerging Themes
 
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc..."Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
 
Organisational culture
Organisational cultureOrganisational culture
Organisational culture
 
The Sustainability Imperative
The Sustainability ImperativeThe Sustainability Imperative
The Sustainability Imperative
 
The UN Global Compact-Accenture CEO Study on Sustainability 2013
The UN Global Compact-Accenture CEO Study on Sustainability 2013The UN Global Compact-Accenture CEO Study on Sustainability 2013
The UN Global Compact-Accenture CEO Study on Sustainability 2013
 
Accenture sustainability academy_overview
Accenture sustainability academy_overviewAccenture sustainability academy_overview
Accenture sustainability academy_overview
 
The Consumer Study: From Marketing to Mattering, Generating Business Value by...
The Consumer Study: From Marketing to Mattering, Generating Business Value by...The Consumer Study: From Marketing to Mattering, Generating Business Value by...
The Consumer Study: From Marketing to Mattering, Generating Business Value by...
 
Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017
 
Risk taking in SME's
Risk taking in SME'sRisk taking in SME's
Risk taking in SME's
 
The "Death" of the Business Plan
The "Death" of the Business PlanThe "Death" of the Business Plan
The "Death" of the Business Plan
 
Advancing Research: Double Your Mileage
Advancing Research: Double Your MileageAdvancing Research: Double Your Mileage
Advancing Research: Double Your Mileage
 
10trends
10trends10trends
10trends
 
Jodie G
Jodie GJodie G
Jodie G
 
Analytics for manufacturers: The three-minute guide
Analytics for manufacturers: The three-minute guideAnalytics for manufacturers: The three-minute guide
Analytics for manufacturers: The three-minute guide
 
Dan C
Dan CDan C
Dan C
 
UN Global Compact—Accenture CEO Study on Sustainability
UN Global Compact—Accenture CEO Study on SustainabilityUN Global Compact—Accenture CEO Study on Sustainability
UN Global Compact—Accenture CEO Study on Sustainability
 
Clyde F
Clyde FClyde F
Clyde F
 
Driving High Performance Through Finance Workforce Mastery
Driving High Performance Through Finance Workforce MasteryDriving High Performance Through Finance Workforce Mastery
Driving High Performance Through Finance Workforce Mastery
 
Francesco P
Francesco PFrancesco P
Francesco P
 
Escape the roundabout: A data-driven path to partnerships
Escape the roundabout: A data-driven path to partnershipsEscape the roundabout: A data-driven path to partnerships
Escape the roundabout: A data-driven path to partnerships
 

En vedette

4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacksCourion Corporation
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzardkevin_donovan
 
14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentationkevin_donovan
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access GovernanceHorst Walther
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Support
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneCyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneAyman Sadiq
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology10 of the Biggest Stories in Technology
10 of the Biggest Stories in TechnologyBrett Cotham
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or LessAmazon Web Services
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 

En vedette (20)

4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
 
my profile
my profilemy profile
my profile
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Itsummit2015 blizzard
Itsummit2015 blizzardItsummit2015 blizzard
Itsummit2015 blizzard
 
14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started Guide
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneCyber Crime Infecting Everyone
Cyber Crime Infecting Everyone
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 

Similaire à Værdien af Identity & Access Management, Jan Quach, Accenture

EOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOKTechnologies
 
Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...InfoDrive Solutions
 
Accenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationAccenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationVikalp Mehta
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About InfosysDurgadatta Dash
 
Enterey Overview 2012 V6 Tt August 2012 Final Blue Background
Enterey Overview 2012 V6 Tt August 2012 Final Blue BackgroundEnterey Overview 2012 V6 Tt August 2012 Final Blue Background
Enterey Overview 2012 V6 Tt August 2012 Final Blue Backgroundrjohnston2268
 
Introducing process insight rev 1 short
Introducing process insight rev 1 shortIntroducing process insight rev 1 short
Introducing process insight rev 1 shortAndrew Ruddick
 
Introducing process insight rev 1 short
Introducing process insight rev 1 shortIntroducing process insight rev 1 short
Introducing process insight rev 1 shortAndrew Ruddick
 
New alliance presentation
New alliance presentationNew alliance presentation
New alliance presentationJody Freeman
 
Real life with Oracle's JD Edwards Applications in the Cloud
Real life with Oracle's JD Edwards Applications in the CloudReal life with Oracle's JD Edwards Applications in the Cloud
Real life with Oracle's JD Edwards Applications in the CloudVelocity Technology Solutions
 
Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Kunal P
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...IBM Sverige
 
Cylsys Software Solution Profile
Cylsys Software Solution Profile Cylsys Software Solution Profile
Cylsys Software Solution Profile Pawas Goyal
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsNandita Nityanandam
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Transforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EYTransforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EYNatalya Copeland
 

Similaire à Værdien af Identity & Access Management, Jan Quach, Accenture (20)

EOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT services
 
Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...
 
Accenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisationAccenture organisational design and structure of formalisation
Accenture organisational design and structure of formalisation
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About Infosys
 
Enterey Overview 2012 V6 Tt August 2012 Final Blue Background
Enterey Overview 2012 V6 Tt August 2012 Final Blue BackgroundEnterey Overview 2012 V6 Tt August 2012 Final Blue Background
Enterey Overview 2012 V6 Tt August 2012 Final Blue Background
 
UVIA Technologies Profile
UVIA Technologies ProfileUVIA Technologies Profile
UVIA Technologies Profile
 
Julian
Julian Julian
Julian
 
Stepping Up Your Mobility Readiness
Stepping Up Your Mobility ReadinessStepping Up Your Mobility Readiness
Stepping Up Your Mobility Readiness
 
Confidis-Briefing-Web
Confidis-Briefing-WebConfidis-Briefing-Web
Confidis-Briefing-Web
 
Introducing process insight rev 1 short
Introducing process insight rev 1 shortIntroducing process insight rev 1 short
Introducing process insight rev 1 short
 
Introducing process insight rev 1 short
Introducing process insight rev 1 shortIntroducing process insight rev 1 short
Introducing process insight rev 1 short
 
New alliance presentation
New alliance presentationNew alliance presentation
New alliance presentation
 
Real life with Oracle's JD Edwards Applications in the Cloud
Real life with Oracle's JD Edwards Applications in the CloudReal life with Oracle's JD Edwards Applications in the Cloud
Real life with Oracle's JD Edwards Applications in the Cloud
 
Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Technorishi's Corporate Presentation
Technorishi's Corporate Presentation
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
 
Cylsys Software Solution Profile
Cylsys Software Solution Profile Cylsys Software Solution Profile
Cylsys Software Solution Profile
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common Confusions
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Transforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EYTransforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EY
 

Plus de IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyIBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjIBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenIBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip NyborgIBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim EscherichIBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenIBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice BayerIBM Danmark
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBMIBM Danmark
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC UpdateIBM Danmark
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introductionIBM Danmark
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminarIBM Danmark
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenIBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyIBM Danmark
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnIBM Danmark
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenIBM Danmark
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexIBM Danmark
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichIBM Danmark
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenIBM Danmark
 

Plus de IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Værdien af Identity & Access Management, Jan Quach, Accenture

  • 1. Identity & Access Management Jan Quach & Aditya Jayanthi Information Security Services Copyright © 2012 Accenture All rights reserved. 1
  • 2. Agenda • We are… • It all started… • Vision • Approach • Journey • So far, so good • What’s in it for you Copyright © 2012 Accenture All rights reserved. 2
  • 3. We are VELUX and Accenture
  • 4. The VELUX Group • Established in 1941 • Approx. 10000 employees globally • 2600 in Denmark • Sales companies in almost 40 countries • Production companies in 11 countries • Head office in Hørsholm, Denmark • Owned by VKR Holding, a limited company wholly owned by foundations and family • VKR Holding turnover 17,8 billion. DKK in 2010. • One of the strongest global brands in the building materials industry • Name and brand registered in almost 100 countries Copyright © 2012 Accenture All rights reserved. 4
  • 5. Accenture • Global management consulting, technology services and outsourcing company • Globally more than 244.000 people • Operating in more than 120 countries • Turnover US$25,5 billion in FY 2011 Security Practice • Over 1800 security professionals • Represented in more than 55 countries • Servicing over 250 clients Copyright © 2012 Accenture All rights reserved. 5
  • 6. Cooperation • VELUX has outsourced IT- application and infrastructure management to Accenture • Accenture delivers advisory services to VELUX • Accenture started working with VELUX to define IAM as part of overall outsourcing deal Copyright © 2012 Accenture All rights reserved. 6
  • 8. Why I&AM? • Inefficient onboarding processes • Inconsistent identity data • Compliance (Audit findings) • Labor intensive processes = Good foundation for I&AM Copyright © 2012 Accenture All rights reserved. 8
  • 10. Vision 1. One common corporate identity for each employee or other associated person • Ensure that all data related to one identity are linked which will heighten the usability and remove sources of error 2. Global consistent joiner/mover/leaver process • Save time and resources for the managers and support functions and reduce obstacles and sources of error 3. Transparency of valid identity data • Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will improve risk management capabilities 4. Agile identity handling and access management • Use automation to reduce time to execute and minimize errors. Copyright © 2012 Accenture All rights reserved. 10
  • 12. Approach 1. Define the vision, high-level strategy and roadmap • Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy for implementation that is aligned with business goals across departments 2. Choose the right technology partners • Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape 3. Implement a proof-of-concept • To goal is to demonstrate capabilities that are relevant for business in specific organizational setting 4. Focus on continuous benefit realization with flexible implementation • Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale implementations with distinct benefit realizations model Copyright © 2012 Accenture All rights reserved. 12
  • 14. Journey 1. Capability assessment and workshops with key stakeholders • Goal was to identify the key areas of improvement and pain points • To introduce the concept to key stakeholders and align the business support 2. Vendor selection and proof-of-concept • Ensure we chose a vendor and not just a product • Developed a PoC based on multiple scenarios 3. Focus on quick wins to get program off the ground • Implemented projects that had quick and visible impact • Proactively focused on areas where IAM is the enabler for implementing better process 4. Aligned with overall IT strategy direction • Be flexible in implementation approach • Align with overall direction of IT strategy to ensure ongoing support Copyright © 2012 Accenture All rights reserved. 14
  • 15. So far, so good
  • 16. Benefit Realization • Implemented enterprise level services • Consistent processes that are easy to adopt • Improved compliance • Greater flexibility to adopt new opportunities The story has just begun Copyright © 2012 Accenture All rights reserved. 16
  • 17. What s in it for you
  • 18. Do’s • Top-level Management support is essential • Broad organizational involvement • Communication at the right level • Risk Management • Legal Matters Copyright © 2012 Accenture All rights reserved. 18
  • 19. Don’ts • Treat I&AM as an IT-project • Aim too high • Promise too much, things take time • Underestimate the “organizational change” aspect • Put I&AM as secondary task, it is a large coordination project Copyright © 2012 Accenture All rights reserved. 19
  • 20. Thanks for listening! Contact information Contact information Jan Quach Aditya Jayanthi Accenture Accenture jan.quach@accenture.com aditya.k.jayanthi@accenture.com
  • 21. Comments or Questions? Come see the Security Systems Team in the Expo area: Jesper Glahn Marcus Eriksson Sven-Erik Vestergaard Denmark Sales Leader Sales Leader, ISS Sara Anwar Security Architect & Qradar Nordic Sales