SlideShare une entreprise Scribd logo
1  sur  6
SWOT ANALYSIS
Implementing a Identity and Access Management System



Strengths                                              Weaknesses


                                  S               W
•Cost Benefits
•Easier compliance                                     •High investment cost
•Built-in Forensic Tools                               •Misunderstandings
•Authentication and                                    about IAM
Authorization
Opportunities                                          Threats



                                 O                 T
•Reduction of costs                                    •No support from top
•Future of IAM                                         executives
•Compliance with audits
                                                       •No support outside IT
                                                       •Incomplete solutions
SWOT ANALYSIS
Strengths




                Current strengths of                        Goals and project
                IAM                                         plan: strengths
                •Identity management processes
                which become automated offer cost
                benefits                                    -Implement automated IAM
                     • Example: Password resets             system to reduce risk and costs
                          cost time and resources at
                          help desk                         •Create a roadmap and vision

                •Inbuilt forensic tools                     •Design architecture of system
                     • Need to find where issue              and select components
                          originated during a breach
                          or leak, this is difficult with   •Develop release schedule and
                          manual IAM system                 timeline

                •Authorization and Authentication
                      •   Prove that an individual
                          holds the identity that she/he
                          claims to hold.
SWOT ANALYSIS
Weaknesses




                Current weaknesses           However:

                                             •"Almost 60% of respondents say their
                High investment costs        companies are unable to effectively
                                             focus IAM controls on areas of greatest
                    • Many of these          business risk"
                       systems do have a
                       high initial cost     •"51% Take a reactive approach to
                                             security issues"
                •There are several myths
                which surround IAM           •"58% of companies studied still rely
                systems                      on manual controls to audit and
                                             control user access to critical
                    • “IAM systems can       enterprise systems and data
                       do everything”, and   resources, leaving networks open to
                                             privacy breaches, failed audits, and
                       “IAM is a             potential fraud or misuse of data“
                       technology only
                       solution”             •http://www.informationweek.com/ne
                                             ws/show/showArticle.jhtml?articleID=
                                             197800526
SWOT ANALYSIS
Opportunities



                Current opportunities
                                                      Goals and project plan:
                •Reduction of costs over time         Opportunities
                    • Maintaining current tools       •Implementing a solid
                       for IM will increase in cost   I&AM solution will reduce
                       over time                      risks and overall costs
                    • Implementing IAM system
                       will reduce costs over time    •There are many resources
                •The future of IAM                    and IAM solutions
                    • IAM tools will become           available from a variety of
                       easier to                      companies which can
                       use, maintain, and             usually be mixed and
                       programs will become           matched and worked with
                       consolodated                   to find the perfect solution
                •Compliance with audits will be       for this company
                much easier
SWOT ANALYSIS
Threats




                Current threats                       Goals and project plan: threats
                •No support from top executives
                      • Lack of support from top      •Gain the support for implementing a
                         executives makes a solid     successful IAM system throughout the
                         IAM soluation almost         orgianzation
                         impossible
                •No support outside IT                •Make sure the entire system is
                      • Some believe an IAM system    planned and executed in a way so the
                         is only for the IT           future vision becomes a reality
                         department. An IAM
                         solution hasa company-wide
                                                      •Make sure the correct systems are
                         architecture
                                                      purchased and put in place to make
                •Incomplete solutions                 the investment match up with cost-
                      • When only certain pieces of   benefit analysis
                         a system are used, the
                         system is not worth the
                         investment usually
SWOT ANALYSIS
Summary




                SWOT summary

Contenu connexe

Tendances

The Cloud Computing and Enterprise Architecture
The Cloud Computing and Enterprise ArchitectureThe Cloud Computing and Enterprise Architecture
The Cloud Computing and Enterprise Architecture
Dr. Saurabh Katiyar
 
Production Support
Production SupportProduction Support
Production Support
r_shanki
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
Amazon Web Services
 
Strategic alignment model
Strategic alignment modelStrategic alignment model
Strategic alignment model
shareefp82
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
CAST
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 

Tendances (20)

Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
The Cloud Computing and Enterprise Architecture
The Cloud Computing and Enterprise ArchitectureThe Cloud Computing and Enterprise Architecture
The Cloud Computing and Enterprise Architecture
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
 
Production Support
Production SupportProduction Support
Production Support
 
Noc and soc deck
Noc and soc deckNoc and soc deck
Noc and soc deck
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Managed IT Services vs. Break-Fix [Infographic]
Managed IT Services vs. Break-Fix [Infographic]Managed IT Services vs. Break-Fix [Infographic]
Managed IT Services vs. Break-Fix [Infographic]
 
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
 
Using Models for Incident, Change, Problem and Request Fulfillment Management
Using Models for Incident, Change, Problem and Request Fulfillment ManagementUsing Models for Incident, Change, Problem and Request Fulfillment Management
Using Models for Incident, Change, Problem and Request Fulfillment Management
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence Adoption
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
Strategic alignment model
Strategic alignment modelStrategic alignment model
Strategic alignment model
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
SharePoint Centre of Excellence
SharePoint Centre of ExcellenceSharePoint Centre of Excellence
SharePoint Centre of Excellence
 

Similaire à Swot 1

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
ebuc
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
Bill Burns
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
Carl Booth
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 

Similaire à Swot 1 (20)

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
 
Identity Access Management Fishnet Security
Identity Access Management Fishnet SecurityIdentity Access Management Fishnet Security
Identity Access Management Fishnet Security
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testing
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
Agile scaling using tools hedwig baars
Agile scaling using tools hedwig baarsAgile scaling using tools hedwig baars
Agile scaling using tools hedwig baars
 
AgileCville: How to sell a traditional client on an Agile project plan
AgileCville:  How to sell a traditional client on an Agile project planAgileCville:  How to sell a traditional client on an Agile project plan
AgileCville: How to sell a traditional client on an Agile project plan
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
 
Agiliance Wp Key Steps
Agiliance Wp Key StepsAgiliance Wp Key Steps
Agiliance Wp Key Steps
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Software Outsourcing: Outsource Your Project or Build a Team
Software Outsourcing: Outsource Your Project or Build a TeamSoftware Outsourcing: Outsource Your Project or Build a Team
Software Outsourcing: Outsource Your Project or Build a Team
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Swot 1

  • 1. SWOT ANALYSIS Implementing a Identity and Access Management System Strengths Weaknesses S W •Cost Benefits •Easier compliance •High investment cost •Built-in Forensic Tools •Misunderstandings •Authentication and about IAM Authorization Opportunities Threats O T •Reduction of costs •No support from top •Future of IAM executives •Compliance with audits •No support outside IT •Incomplete solutions
  • 2. SWOT ANALYSIS Strengths Current strengths of Goals and project IAM plan: strengths •Identity management processes which become automated offer cost benefits -Implement automated IAM • Example: Password resets system to reduce risk and costs cost time and resources at help desk •Create a roadmap and vision •Inbuilt forensic tools •Design architecture of system • Need to find where issue and select components originated during a breach or leak, this is difficult with •Develop release schedule and manual IAM system timeline •Authorization and Authentication • Prove that an individual holds the identity that she/he claims to hold.
  • 3. SWOT ANALYSIS Weaknesses Current weaknesses However: •"Almost 60% of respondents say their High investment costs companies are unable to effectively focus IAM controls on areas of greatest • Many of these business risk" systems do have a high initial cost •"51% Take a reactive approach to security issues" •There are several myths which surround IAM •"58% of companies studied still rely systems on manual controls to audit and control user access to critical • “IAM systems can enterprise systems and data do everything”, and resources, leaving networks open to privacy breaches, failed audits, and “IAM is a potential fraud or misuse of data“ technology only solution” •http://www.informationweek.com/ne ws/show/showArticle.jhtml?articleID= 197800526
  • 4. SWOT ANALYSIS Opportunities Current opportunities Goals and project plan: •Reduction of costs over time Opportunities • Maintaining current tools •Implementing a solid for IM will increase in cost I&AM solution will reduce over time risks and overall costs • Implementing IAM system will reduce costs over time •There are many resources •The future of IAM and IAM solutions • IAM tools will become available from a variety of easier to companies which can use, maintain, and usually be mixed and programs will become matched and worked with consolodated to find the perfect solution •Compliance with audits will be for this company much easier
  • 5. SWOT ANALYSIS Threats Current threats Goals and project plan: threats •No support from top executives • Lack of support from top •Gain the support for implementing a executives makes a solid successful IAM system throughout the IAM soluation almost orgianzation impossible •No support outside IT •Make sure the entire system is • Some believe an IAM system planned and executed in a way so the is only for the IT future vision becomes a reality department. An IAM solution hasa company-wide •Make sure the correct systems are architecture purchased and put in place to make •Incomplete solutions the investment match up with cost- • When only certain pieces of benefit analysis a system are used, the system is not worth the investment usually
  • 6. SWOT ANALYSIS Summary SWOT summary