SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Achieving a Successful Identity
Management and Governance Deployment
The Florida Blue Experience
Linley Ali
Security
Florida Blue
Head of Enterprise Wide Technical Architecture
SCT08S
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Florida Blue recently undertook a large-scale identity
management deployment in order to help improve their
business agility and increase efficiencies. In doing so, they faced
a number of common challenges. This session will cover these
critical considerations and the methodology Florida Blue
followed to approach their project and the strategies and tactics
that they chose to adopt. Most importantly, it will show the
benefits to the business that they have achieved, and the
lessons that were learned during this complex process.
Linley Ali
Florida Blue
Head of Enterprise Wide
Technical Architecture
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
BUSINESS DRIVERS
SOLUTION SELECTION CRITERIA
METHODOLOGY
OUTCOMES
LESSONS LEARNED
1
2
3
4
5
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Drivers for Florida Blue CA IMAG Solution
 Reduce new hire provisioning from 1 week to 1 day or less
 Improve efficiencies by automating the user
provisioning process
 Address audit compliance by de-provisioning
terminated users – in a timely manner
 Automate user attestation/certification for
compliance adherence
 Improve audit capabilities and mitigate risks related
to lack of evidence
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Solution Selection Criteria
 COTS vs. homegrown
– Ongoing maintenance with homegrown scripts & programs
– Lack of support to expand additional endpoints
 Why CA Identity Management and Governance (CA IMAG)?
– Single unified solution and single vendor support
– CA Single Sign-On (formerly CA SiteMinder™) widely used to
protect web applications
– CA Identity Manager supporting CA SSO user management
– Replace Oracle Identity Analytics with CA Identity Governance
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Approach and Methodology
 Defining requirements
– Business analysts created requirements document collaborating
with cross functional organizations (HR, Information Security
and Technology Organization (ISTO) and others)
 Prioritization of functionality based upon business value
– Phase-1 deployment included role definition for automation
– Five core applications / systems for user management and role mining
 Rollout strategy
– User population was limited to employees
– Use cases limited to on-boarding and off-boarding
– Role certification and privileged user certification
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Solution Overview
CA
Identity Manager
CA Identity
Governance
Role Exports
Data Imported for
role mining and
certifications
Endpoints
Oracle, Siebel, LDAP, Mainframe (RACF) and other on-prem applications
Security Admins Role Admins
Certifiers
PeopleSoft HR Feed
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Solution Outcome
 Reduced time to provision users by 95% - from 1 week to
under 2 hours (Feed runs every 2 hours)
 Eliminated manual effort by automating provisioning
based on HR data and related errors
 Birthright enterprise roles for employees specific
to job function reduced ad hoc manual
provisioning delays
 Identity Governance instrumental in defining birthright
enterprise roles with role mining and role certification
 Eliminated manual import of data for attestation by importing
data from CA Identity Manager
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Lessons Learned
 Having knowledgeable resources, strong,
experienced and focused is critical for success
 CA Education courses were useful
 Having resources present on-site fostered stronger
collaboration among team members, quicker issue resolution,
obstacles and keeping project efforts on track
 Scope management by avoiding scope-creep was critical to
the success of delivering on time and on budget
 Organization changes impacted business rules trigger for
automation based on HR feed. Better coordination and
process change required to accommodate future reorg.
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM
SCT29S
Case Study: Digital Transformation through Successful,
Large-scale Identity Management Deployment
11/19/2015 at 11:30 AM
SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Protect Against
Fraud & Breaches
CA Advanced Auth
Security Theater
Engage
Customers
CA SSO
Security Theater
Enable Employees
and Partners
CA IMAG
Security Theater
Accelerate IAM
Time to Value
CA IMAG, Directory
Security Theater
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

Contenu connexe

Tendances

How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...CA Technologies
 
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services OrchestratorCA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...CA Technologies
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent BystanderCA Technologies
 
Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCA Technologies
 
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...CA Technologies
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...CA Technologies
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital EconomyCA Technologies
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersCA Technologies
 
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...CA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumCA Technologies
 

Tendances (20)

How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
 
Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 Days
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
 
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
 
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at Unum
 

En vedette

Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Controlwebhostingguy
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Techvineet jain
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)Amod Upadhyay
 
How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteCA Technologies
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsCA Technologies
 
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic SolutionsBe the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic SolutionsCA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...CA Technologies
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 

En vedette (13)

Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
 
How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity Suite
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized Benefits
 
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic SolutionsBe the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 

Similaire à Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueCA Technologies
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionCA Technologies
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...CA Technologies
 
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCase Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
Managing and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPMManaging and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPMCA Technologies
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile IntegrationsCA Technologies
 
How Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application EconomyHow Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application EconomyCA Technologies
 
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...CA Technologies
 
Five Essential Steps of an Agile Transformation Journey
Five Essential Stepsof an Agile Transformation JourneyFive Essential Stepsof an Agile Transformation Journey
Five Essential Steps of an Agile Transformation JourneyCA Technologies
 
CA Project & Portfolio Management for Business Transformation : Prioritize, ...
CA Project & Portfolio Management for Business Transformation: Prioritize, ...CA Project & Portfolio Management for Business Transformation: Prioritize, ...
CA Project & Portfolio Management for Business Transformation : Prioritize, ...CA Technologies
 
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP JobsReducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP JobsCA Technologies
 
An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)CA Technologies
 
HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION
 HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION
HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATIONMohit Sharma (GAICD)
 
Andrew phillips resume february 2016
Andrew phillips resume february 2016Andrew phillips resume february 2016
Andrew phillips resume february 2016parsigma
 
Andrew Phillips Resume February 2016
Andrew Phillips Resume February 2016Andrew Phillips Resume February 2016
Andrew Phillips Resume February 2016parsigma
 
Andrew Phillips Rresume February 2016
Andrew Phillips Rresume February 2016Andrew Phillips Rresume February 2016
Andrew Phillips Rresume February 2016parsigma
 
Agile 101 For The Enterprise
Agile 101 For The EnterpriseAgile 101 For The Enterprise
Agile 101 For The EnterpriseCA Technologies
 
Accelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for BusinessAccelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for BusinessCA Technologies
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessLeverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessCA Technologies
 

Similaire à Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience (20)

Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business Value
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
 
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCase Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
Case Study: Molina Medicaid Solutions Transforms Healthcare Through Automation
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
Managing and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPMManaging and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPM
 
CA PPM 14.x Agile Integrations
CA PPM14.x Agile IntegrationsCA PPM14.x Agile Integrations
CA PPM 14.x Agile Integrations
 
How Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application EconomyHow Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application Economy
 
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...
Guiding Standardization Across the Enterprise at Walt Disney Parks & Resorts...
 
Five Essential Steps of an Agile Transformation Journey
Five Essential Stepsof an Agile Transformation JourneyFive Essential Stepsof an Agile Transformation Journey
Five Essential Steps of an Agile Transformation Journey
 
CA Project & Portfolio Management for Business Transformation : Prioritize, ...
CA Project & Portfolio Management for Business Transformation: Prioritize, ...CA Project & Portfolio Management for Business Transformation: Prioritize, ...
CA Project & Portfolio Management for Business Transformation : Prioritize, ...
 
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP JobsReducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
 
An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)
 
HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION
 HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION
HOW TO OVERCOME TECHNICAL LIMITATIONS TO SCALE UP AUTOMATION
 
Andrew phillips resume february 2016
Andrew phillips resume february 2016Andrew phillips resume february 2016
Andrew phillips resume february 2016
 
Andrew Phillips Resume February 2016
Andrew Phillips Resume February 2016Andrew Phillips Resume February 2016
Andrew Phillips Resume February 2016
 
Andrew Phillips Rresume February 2016
Andrew Phillips Rresume February 2016Andrew Phillips Rresume February 2016
Andrew Phillips Rresume February 2016
 
Agile 101 For The Enterprise
Agile 101 For The EnterpriseAgile 101 For The Enterprise
Agile 101 For The Enterprise
 
Accelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for BusinessAccelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for Business
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessLeverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for Success
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Dernier (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

  • 1. Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience Linley Ali Security Florida Blue Head of Enterprise Wide Technical Architecture SCT08S #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Florida Blue recently undertook a large-scale identity management deployment in order to help improve their business agility and increase efficiencies. In doing so, they faced a number of common challenges. This session will cover these critical considerations and the methodology Florida Blue followed to approach their project and the strategies and tactics that they chose to adopt. Most importantly, it will show the benefits to the business that they have achieved, and the lessons that were learned during this complex process. Linley Ali Florida Blue Head of Enterprise Wide Technical Architecture
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda BUSINESS DRIVERS SOLUTION SELECTION CRITERIA METHODOLOGY OUTCOMES LESSONS LEARNED 1 2 3 4 5
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Drivers for Florida Blue CA IMAG Solution  Reduce new hire provisioning from 1 week to 1 day or less  Improve efficiencies by automating the user provisioning process  Address audit compliance by de-provisioning terminated users – in a timely manner  Automate user attestation/certification for compliance adherence  Improve audit capabilities and mitigate risks related to lack of evidence
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Selection Criteria  COTS vs. homegrown – Ongoing maintenance with homegrown scripts & programs – Lack of support to expand additional endpoints  Why CA Identity Management and Governance (CA IMAG)? – Single unified solution and single vendor support – CA Single Sign-On (formerly CA SiteMinder™) widely used to protect web applications – CA Identity Manager supporting CA SSO user management – Replace Oracle Identity Analytics with CA Identity Governance
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Approach and Methodology  Defining requirements – Business analysts created requirements document collaborating with cross functional organizations (HR, Information Security and Technology Organization (ISTO) and others)  Prioritization of functionality based upon business value – Phase-1 deployment included role definition for automation – Five core applications / systems for user management and role mining  Rollout strategy – User population was limited to employees – Use cases limited to on-boarding and off-boarding – Role certification and privileged user certification
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Overview CA Identity Manager CA Identity Governance Role Exports Data Imported for role mining and certifications Endpoints Oracle, Siebel, LDAP, Mainframe (RACF) and other on-prem applications Security Admins Role Admins Certifiers PeopleSoft HR Feed
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Outcome  Reduced time to provision users by 95% - from 1 week to under 2 hours (Feed runs every 2 hours)  Eliminated manual effort by automating provisioning based on HR data and related errors  Birthright enterprise roles for employees specific to job function reduced ad hoc manual provisioning delays  Identity Governance instrumental in defining birthright enterprise roles with role mining and role certification  Eliminated manual import of data for attestation by importing data from CA Identity Manager
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Lessons Learned  Having knowledgeable resources, strong, experienced and focused is critical for success  CA Education courses were useful  Having resources present on-site fostered stronger collaboration among team members, quicker issue resolution, obstacles and keeping project efforts on track  Scope management by avoiding scope-creep was critical to the success of delivering on time and on budget  Organization changes impacted business rules trigger for automation based on HR feed. Better coordination and process change required to accommodate future reorg.
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM SCT29S Case Study: Digital Transformation through Successful, Large-scale Identity Management Deployment 11/19/2015 at 11:30 AM SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Protect Against Fraud & Breaches CA Advanced Auth Security Theater Engage Customers CA SSO Security Theater Enable Employees and Partners CA IMAG Security Theater Accelerate IAM Time to Value CA IMAG, Directory Security Theater
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15