SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
CDH


CDH   Identity Management



               April 21, 2010
CDH                    Quick Facts



About Us           Approach            Partnerships
• 20th Year        • Vendor Agnostic   •   Microsoft Gold
• Grand Rapids &   • Non-reseller      •   VMware Enterprise
  Royal Oak        • Professional      •   Cisco Premier
• 25 Staff           Services Only     •   Novell Platinum
                                       •   Citrix Silver
CDH                    Expertise
  Project Management     Infrastructure               P
                                                      I
                                                      C
                                                      A




  Collaboration          Access & Identity Management




                                                  3
CDH                     Overview

      • Specific focus on enterprise identity
        management
         – SMB session to be offered later
      • Discussion about what identity
        management is and what it involves
      • Project Approach and Planning
      • Market Capabilities and Trends
      • Vendor Comparisons and Overviews
CDH    What is Identity Management?

      • User account creation, management, and
        cleanup
      • Attribute synchronization
      • Password synchronization
      • Password self-service
      • Delegated Management
      • Role Management
      • Single Sign On
      • Privileged User Management…..
CDH    What Identity Management Is Not

      • Not a replacement for application/system
        management tools (though it can minimize
        the need to use them)
      • Not a primary security enforcement tool
        (though it can help)
      • Not simple
      • Not cheap
      • Not able to solve world hunger
CDH                  Approaches

      • Rule based account sync
        – Very common first initiative
        – Actions based on established rules
      • Roles based provisioning
        – Role mining/analysis
        – Enterprise role modeling
      • Workflow system
        – Electronic forms and processes
        – Doesn’t require systems to be connected
CDH   Balanced Approach
CDH   Services Infrastructure
CDH              Initial Approach

      • Get management buy in
      • Analyze systems, applications, and
        processes across business units
      • Determine the pain points
      • Determine the points of greatest risk
      • Determine compliance requirements
      • Determine desired process improvements
      • Review current skill sets
CDH              Vendor Selection

      • Determine most suitable vendors
        – Previous analysis as basis
        – License agreements/Pricing
        – Granular yet scalable
      • Demo/POC environment
        – Get the vendors/partners (wink-wink) to help
        – Most can be completely virtual
CDH      Vendor Selection Continued

      • Exercise/test/play
        – Feed it samples of current data
        – Build representative roles
        – Involve other business units
           • Helpdesk, HR, others
           • Workflow interaction
           • Role management and assignment
CDH              Common Mistakes

      • Taking on too much at once
        – Important to take it slow at first
      • Failure to get upper management buy-in
        – Business processes will change
      • Scope creep
        – “Let’s add this one simple application”
      • Allowing requirements to go unchecked
        – Contributes to complexity and scope creep
      • Not taking the exceptions into account
CDH         More Common Mistakes

      • Not changing business processes
         – Too many implementations just automate bad
           processes
         – Use the opportunity to revise processes
      • Expectation of immediate ROI
         – Initially many processes may be duplicated for
           a time
      • Failure to establish full testing plans
         – Automated testing preferred
CDH        More Common Mistakes

      • Using the existing NOS directory as the
        central ID repository
        – AD/eDir is a file, print, and workstation
          management directory
        – It should be treated like all other connected
          apps/systems
      • Collapsing too much to a single directory
        – Allow apps to have their own directory
        – IDM allows easy management of separate
          directories
CDH


CDH   Market
CDH               Market Trends

      • User provisioning almost becoming a
        commodity – everyone does it
      • More emphasis is being placed on Roles
        and Governance, Risk, and Compliance
        (GRC) management
      • Data Leak Prevention (DLP) integration
        becoming more commonplace
      • Organizations tending to more look at IDM
        holistically
CDH                 Market Trends

      • Wizards, web GUIs, business process
        mapping tools, and “codeless” capabilities
        are reducing implementation times
        – Time to take a 2nd look
      • Greater integration with partnering
        technologies from other vendors
        – Role management products
        – SSO products
      • Many acquisitions changing the landscape
CDH                          Roles

      • Typically have multiple levels
        – Business roles
        – Permission roles
      • Entitlements/resources typically assigned
        to roles
      • Some can be 100% based on attribute
        values
      • Most should allow manual assignment with
        approvals
CDH                         GRC

      • What is it?
      • Governance
        – Establishing role and entitlement policies
      • Risk
        – Assigning risk factors to roles and entitlements
      • Compliance
        – Preventing unjustified access and proving it
CDH                GRC Example

      • Risk levels are assigned to roles and
        entitlements
      • Increased scrutiny and monitoring applied
        to higher risk roles and entitlements
      • The risk levels of the roles and
        entitlements assigned to a person add up
        to a threat level
      • Increased scrutiny and monitoring of the
        user result from the increased threat level
CDH


CDH   Vendor Comparisons
CDH   Vendor Grid
Enterprise Role Management
CDH        Market (Forrester)




       Forrester Enterprise Role Mgmt - Feb 09
Enterprise Role Management
CDH        Market (Forrester)




       Forrester Enterprise Role Mgmt - Feb 09
CDH   User Provisioning
CDH


CDH   Vendor Overviews
CDH                   Microsoft

      • New release – FIM
      • Still way behind in the market, FIM won’t
        significantly change this
      • Still may be an easy choice for MS shops
        with limited needs
      • Can be cheaper than other solutions, but
        not on an apples-to-apples comparison
      • MS has stated that they want to become a
        leader in the market – will take much work
CDH                      Sentillion

      • Acquired by Microsoft
        – Still trying to figure out how to best integrate
          the technologies
        – Some of the technologies directly compete
          with FIM – what’s going to win?
      • Healthcare focused
        – Almost exclusively
CDH                      Novell

      • Continues to fight the “bad” reputation of
        their name
      • No concern over Novell’s viability
      • Extraordinary capabilities with limited
        coding requirements
      • Offers unparalleled platform flexibility
      • IDM 4 brings strong new capabilities to the
        mix – “game changers”
CDH                     Courion

      • A strong suite of powerful products
      • Focused specifically in identity
        management technologies
      • One of the earliest to offer SharePoint
        integration & management
      • Establishes partnerships and provides
        tight integration
      • Excellent rogue account management
CDH                  Oracle/Sun

      • Much FUD about what the merger actually
        means, not all is undeserved
      • Some integration has already occurred
        – Sun products being rename to Oracle xx
      • Highly capable solutions
      • Deep development requirements
        – Do you have dedicate Java developers?
        – You’ll need more
CDH                       IBM

      • Shares top tier rating
      • Part of the Tivoli suite of products
      • XPRESS for simpler implementation
        – XML based
      • Like Oracle/Sun, requires pretty deep
        development for more complex
        functionality
      • Aggressive product pricing in IBM shops
CDH                        CA

      • Recently acquired Eurekify, an excellent
        role mining and management vendor
      • Uses Policy Xpress (sound familiar?) to
        simplify policy “development”
      • GUI workflow designer tool
      • Also fights a bad rep at times
      • Tends to ignore smaller engagements
CDH               Other Vendors

      • Too many to list!
      • A number build on Microsoft solution
      • Some show much promise
        – EmpowerID from The Dot Net Factory
CDH


CDH   Solution Similarities
CDH                   Commonalities

      • Centralized identity repository
        –   Identity Vault
        –   Metaverse
        –   ID Store
        –   LDAP
      • XML
        – Config and settings files
        – Transaction documents
        – Rules and policies
CDH              Common Claims

      • Agent-less
        – Usually means limited (AD API vs LDAP)
        – MUST have an agent (client or server) for
          password sync from an app/system
      • GUI Builders and Wizards
        – Meant to simplify development
        – Provide for basic functionality
        – Sometimes don’t go far enough (how do you
          extend?)
CDH


CDH   C/D/H IDM Perspective
CDH              C/D/H Experience

      • We help determine what IDM solution set
        and vendor is best based on the
        organization
        – Sync, SSO, reporting, monitoring
        – Existing relationships, budget, scope, skills
      • Clients from 250 to 250,000 users
      • Medium-large focus
        – Most clients in the 3,000-8,000 user range
CDH             C/D/H Experience

      • Few in-house developers
        – Well established developer relationships
          utilized when needed
        – Focus more on business process planning
      • We like solutions requiring minimal
        development
        – Microsoft
        – Novell
        – Courion
CDH   C/D/H Experience
CDH   C/D/H Experience
CDH                         Thank You

 Royal Oak                                  Grand Rapids
 306 S. Washington Ave.                     15 Ionia SW
 Suite 212                                  Suite 270
 Royal Oak, MI 48067                        Grand Rapids, MI 49503
 p: (248) 546-1800                          p: (616) 776-1600




                 www.cdh.com
                   (c) C/D/H 2007. All rights reserved

Contenu connexe

Tendances

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 

Tendances (20)

IdM FinalVer
IdM FinalVerIdM FinalVer
IdM FinalVer
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s Next
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 

En vedette

Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
Saiful Chowdhury
 
Object recognition
Object recognitionObject recognition
Object recognition
akkichester
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
WSO2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
 

En vedette (18)

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentation
 
Identity Management Manifesto
Identity Management ManifestoIdentity Management Manifesto
Identity Management Manifesto
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 

Similaire à Identity Management: What Solution is Right for You?

Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
Bluewolf
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 

Similaire à Identity Management: What Solution is Right for You? (20)

Salesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social EnterpriseSalesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social Enterprise
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
 
B2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWSB2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWS
 
How to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionHow to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selection
 
Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
 
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 Moving Oracle Applications to the Cloud - Which Cloud is Right for Me? Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
Moving Oracle Applications to the Cloud - Which Cloud is Right for Me?
 
Patching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP CloudPatching is Your Friend in the New World Order of EPM and ERP Cloud
Patching is Your Friend in the New World Order of EPM and ERP Cloud
 
Continuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIXContinuous Deployment - Case Study at WIX
Continuous Deployment - Case Study at WIX
 
Mind Chips Consulting Offerings
Mind Chips Consulting   OfferingsMind Chips Consulting   Offerings
Mind Chips Consulting Offerings
 
Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...Five Pain Points of Agile Development (And How Software Version Management Ca...
Five Pain Points of Agile Development (And How Software Version Management Ca...
 
Patterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsPatterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps Tools
 
SEC Presentation V2
SEC Presentation V2SEC Presentation V2
SEC Presentation V2
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
Journey to the Cloud: What I Wish I Knew Before I Started
 Journey to the Cloud: What I Wish I Knew Before I Started Journey to the Cloud: What I Wish I Knew Before I Started
Journey to the Cloud: What I Wish I Knew Before I Started
 
The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012The Impact of Cloud on Procurement Presentation 30th may 2012
The Impact of Cloud on Procurement Presentation 30th may 2012
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Spm lecture-5
Spm lecture-5Spm lecture-5
Spm lecture-5
 

Plus de C/D/H Technology Consultants

Plus de C/D/H Technology Consultants (20)

6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
No Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 MigrationNo Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 Migration
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Google for education vs office 365
Google for education vs office 365Google for education vs office 365
Google for education vs office 365
 
C/D/H 1990-2015
C/D/H 1990-2015C/D/H 1990-2015
C/D/H 1990-2015
 
SharePoint for Government
SharePoint for GovernmentSharePoint for Government
SharePoint for Government
 
Lean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft AzureLean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft Azure
 
SharePoint site admins leverage search
SharePoint site admins leverage searchSharePoint site admins leverage search
SharePoint site admins leverage search
 
Real world records management in SharePoint 2013
Real world records management in SharePoint 2013Real world records management in SharePoint 2013
Real world records management in SharePoint 2013
 
Real world records management in share point 2013
Real world records management in share point 2013Real world records management in share point 2013
Real world records management in share point 2013
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Microsoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentationMicrosoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentation
 
Office 365 branding webinar
Office 365 branding webinarOffice 365 branding webinar
Office 365 branding webinar
 
Have It Your Way! SharePoint Customizations
Have It Your Way! SharePoint CustomizationsHave It Your Way! SharePoint Customizations
Have It Your Way! SharePoint Customizations
 
C/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy StepsC/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy Steps
 
Real world rm in share point 2013
Real world rm in share point 2013Real world rm in share point 2013
Real world rm in share point 2013
 
Lync seminar preso all content
Lync seminar preso all contentLync seminar preso all content
Lync seminar preso all content
 
Office 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the CloudOffice 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the Cloud
 
Epm seminar presentation
Epm seminar presentationEpm seminar presentation
Epm seminar presentation
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Identity Management: What Solution is Right for You?

  • 1. CDH CDH Identity Management April 21, 2010
  • 2. CDH Quick Facts About Us Approach Partnerships • 20th Year • Vendor Agnostic • Microsoft Gold • Grand Rapids & • Non-reseller • VMware Enterprise Royal Oak • Professional • Cisco Premier • 25 Staff Services Only • Novell Platinum • Citrix Silver
  • 3. CDH Expertise Project Management Infrastructure P I C A Collaboration Access & Identity Management 3
  • 4. CDH Overview • Specific focus on enterprise identity management – SMB session to be offered later • Discussion about what identity management is and what it involves • Project Approach and Planning • Market Capabilities and Trends • Vendor Comparisons and Overviews
  • 5. CDH What is Identity Management? • User account creation, management, and cleanup • Attribute synchronization • Password synchronization • Password self-service • Delegated Management • Role Management • Single Sign On • Privileged User Management…..
  • 6. CDH What Identity Management Is Not • Not a replacement for application/system management tools (though it can minimize the need to use them) • Not a primary security enforcement tool (though it can help) • Not simple • Not cheap • Not able to solve world hunger
  • 7. CDH Approaches • Rule based account sync – Very common first initiative – Actions based on established rules • Roles based provisioning – Role mining/analysis – Enterprise role modeling • Workflow system – Electronic forms and processes – Doesn’t require systems to be connected
  • 8. CDH Balanced Approach
  • 9. CDH Services Infrastructure
  • 10. CDH Initial Approach • Get management buy in • Analyze systems, applications, and processes across business units • Determine the pain points • Determine the points of greatest risk • Determine compliance requirements • Determine desired process improvements • Review current skill sets
  • 11. CDH Vendor Selection • Determine most suitable vendors – Previous analysis as basis – License agreements/Pricing – Granular yet scalable • Demo/POC environment – Get the vendors/partners (wink-wink) to help – Most can be completely virtual
  • 12. CDH Vendor Selection Continued • Exercise/test/play – Feed it samples of current data – Build representative roles – Involve other business units • Helpdesk, HR, others • Workflow interaction • Role management and assignment
  • 13. CDH Common Mistakes • Taking on too much at once – Important to take it slow at first • Failure to get upper management buy-in – Business processes will change • Scope creep – “Let’s add this one simple application” • Allowing requirements to go unchecked – Contributes to complexity and scope creep • Not taking the exceptions into account
  • 14. CDH More Common Mistakes • Not changing business processes – Too many implementations just automate bad processes – Use the opportunity to revise processes • Expectation of immediate ROI – Initially many processes may be duplicated for a time • Failure to establish full testing plans – Automated testing preferred
  • 15. CDH More Common Mistakes • Using the existing NOS directory as the central ID repository – AD/eDir is a file, print, and workstation management directory – It should be treated like all other connected apps/systems • Collapsing too much to a single directory – Allow apps to have their own directory – IDM allows easy management of separate directories
  • 16. CDH CDH Market
  • 17. CDH Market Trends • User provisioning almost becoming a commodity – everyone does it • More emphasis is being placed on Roles and Governance, Risk, and Compliance (GRC) management • Data Leak Prevention (DLP) integration becoming more commonplace • Organizations tending to more look at IDM holistically
  • 18. CDH Market Trends • Wizards, web GUIs, business process mapping tools, and “codeless” capabilities are reducing implementation times – Time to take a 2nd look • Greater integration with partnering technologies from other vendors – Role management products – SSO products • Many acquisitions changing the landscape
  • 19. CDH Roles • Typically have multiple levels – Business roles – Permission roles • Entitlements/resources typically assigned to roles • Some can be 100% based on attribute values • Most should allow manual assignment with approvals
  • 20. CDH GRC • What is it? • Governance – Establishing role and entitlement policies • Risk – Assigning risk factors to roles and entitlements • Compliance – Preventing unjustified access and proving it
  • 21. CDH GRC Example • Risk levels are assigned to roles and entitlements • Increased scrutiny and monitoring applied to higher risk roles and entitlements • The risk levels of the roles and entitlements assigned to a person add up to a threat level • Increased scrutiny and monitoring of the user result from the increased threat level
  • 22. CDH CDH Vendor Comparisons
  • 23. CDH Vendor Grid
  • 24. Enterprise Role Management CDH Market (Forrester) Forrester Enterprise Role Mgmt - Feb 09
  • 25. Enterprise Role Management CDH Market (Forrester) Forrester Enterprise Role Mgmt - Feb 09
  • 26. CDH User Provisioning
  • 27. CDH CDH Vendor Overviews
  • 28. CDH Microsoft • New release – FIM • Still way behind in the market, FIM won’t significantly change this • Still may be an easy choice for MS shops with limited needs • Can be cheaper than other solutions, but not on an apples-to-apples comparison • MS has stated that they want to become a leader in the market – will take much work
  • 29. CDH Sentillion • Acquired by Microsoft – Still trying to figure out how to best integrate the technologies – Some of the technologies directly compete with FIM – what’s going to win? • Healthcare focused – Almost exclusively
  • 30. CDH Novell • Continues to fight the “bad” reputation of their name • No concern over Novell’s viability • Extraordinary capabilities with limited coding requirements • Offers unparalleled platform flexibility • IDM 4 brings strong new capabilities to the mix – “game changers”
  • 31. CDH Courion • A strong suite of powerful products • Focused specifically in identity management technologies • One of the earliest to offer SharePoint integration & management • Establishes partnerships and provides tight integration • Excellent rogue account management
  • 32. CDH Oracle/Sun • Much FUD about what the merger actually means, not all is undeserved • Some integration has already occurred – Sun products being rename to Oracle xx • Highly capable solutions • Deep development requirements – Do you have dedicate Java developers? – You’ll need more
  • 33. CDH IBM • Shares top tier rating • Part of the Tivoli suite of products • XPRESS for simpler implementation – XML based • Like Oracle/Sun, requires pretty deep development for more complex functionality • Aggressive product pricing in IBM shops
  • 34. CDH CA • Recently acquired Eurekify, an excellent role mining and management vendor • Uses Policy Xpress (sound familiar?) to simplify policy “development” • GUI workflow designer tool • Also fights a bad rep at times • Tends to ignore smaller engagements
  • 35. CDH Other Vendors • Too many to list! • A number build on Microsoft solution • Some show much promise – EmpowerID from The Dot Net Factory
  • 36. CDH CDH Solution Similarities
  • 37. CDH Commonalities • Centralized identity repository – Identity Vault – Metaverse – ID Store – LDAP • XML – Config and settings files – Transaction documents – Rules and policies
  • 38. CDH Common Claims • Agent-less – Usually means limited (AD API vs LDAP) – MUST have an agent (client or server) for password sync from an app/system • GUI Builders and Wizards – Meant to simplify development – Provide for basic functionality – Sometimes don’t go far enough (how do you extend?)
  • 39. CDH CDH C/D/H IDM Perspective
  • 40. CDH C/D/H Experience • We help determine what IDM solution set and vendor is best based on the organization – Sync, SSO, reporting, monitoring – Existing relationships, budget, scope, skills • Clients from 250 to 250,000 users • Medium-large focus – Most clients in the 3,000-8,000 user range
  • 41. CDH C/D/H Experience • Few in-house developers – Well established developer relationships utilized when needed – Focus more on business process planning • We like solutions requiring minimal development – Microsoft – Novell – Courion
  • 42. CDH C/D/H Experience
  • 43. CDH C/D/H Experience
  • 44. CDH Thank You Royal Oak Grand Rapids 306 S. Washington Ave. 15 Ionia SW Suite 212 Suite 270 Royal Oak, MI 48067 Grand Rapids, MI 49503 p: (248) 546-1800 p: (616) 776-1600 www.cdh.com (c) C/D/H 2007. All rights reserved