SlideShare une entreprise Scribd logo
SWOT ANALYSIS
Implementing a Identity and Access Management System



Strengths                                              Weaknesses


                                  S               W
•Cost Benefits
•Easier compliance                                     •High investment cost
•Built-in Forensic Tools                               •Misunderstandings
•Authentication and                                    about IAM
Authorization
Opportunities                                          Threats



                                 O                 T
•Reduction of costs                                    •No support from top
•Future of IAM                                         executives
•Compliance with audits
                                                       •No support outside IT
                                                       •Incomplete solutions
SWOT ANALYSIS
Strengths




                Current strengths of                        Goals and project
                IAM                                         plan: strengths
                •Identity management processes
                which become automated offer cost
                benefits                                    -Implement automated IAM
                     • Example: Password resets             system to reduce risk and costs
                          cost time and resources at
                          help desk                         •Create a roadmap and vision

                •Inbuilt forensic tools                     •Design architecture of system
                     • Need to find where issue              and select components
                          originated during a breach
                          or leak, this is difficult with   •Develop release schedule and
                          manual IAM system                 timeline

                •Authorization and Authentication
                      •   Prove that an individual
                          holds the identity that she/he
                          claims to hold.
SWOT ANALYSIS
Weaknesses




                Current weaknesses           However:

                                             •"Almost 60% of respondents say their
                High investment costs        companies are unable to effectively
                                             focus IAM controls on areas of greatest
                    • Many of these          business risk"
                       systems do have a
                       high initial cost     •"51% Take a reactive approach to
                                             security issues"
                •There are several myths
                which surround IAM           •"58% of companies studied still rely
                systems                      on manual controls to audit and
                                             control user access to critical
                    • “IAM systems can       enterprise systems and data
                       do everything”, and   resources, leaving networks open to
                                             privacy breaches, failed audits, and
                       “IAM is a             potential fraud or misuse of data“
                       technology only
                       solution”             •http://www.informationweek.com/ne
                                             ws/show/showArticle.jhtml?articleID=
                                             197800526
SWOT ANALYSIS
Opportunities



                Current opportunities
                                                      Goals and project plan:
                •Reduction of costs over time         Opportunities
                    • Maintaining current tools       •Implementing a solid
                       for IM will increase in cost   I&AM solution will reduce
                       over time                      risks and overall costs
                    • Implementing IAM system
                       will reduce costs over time    •There are many resources
                •The future of IAM                    and IAM solutions
                    • IAM tools will become           available from a variety of
                       easier to                      companies which can
                       use, maintain, and             usually be mixed and
                       programs will become           matched and worked with
                       consolodated                   to find the perfect solution
                •Compliance with audits will be       for this company
                much easier
SWOT ANALYSIS
Threats




                Current threats                       Goals and project plan: threats
                •No support from top executives
                      • Lack of support from top      •Gain the support for implementing a
                         executives makes a solid     successful IAM system throughout the
                         IAM soluation almost         orgianzation
                         impossible
                •No support outside IT                •Make sure the entire system is
                      • Some believe an IAM system    planned and executed in a way so the
                         is only for the IT           future vision becomes a reality
                         department. An IAM
                         solution hasa company-wide
                                                      •Make sure the correct systems are
                         architecture
                                                      purchased and put in place to make
                •Incomplete solutions                 the investment match up with cost-
                      • When only certain pieces of   benefit analysis
                         a system are used, the
                         system is not worth the
                         investment usually
SWOT ANALYSIS
Summary




                SWOT summary

Contenu connexe

Tendances

Vave_Overview_Feb_2016
Vave_Overview_Feb_2016Vave_Overview_Feb_2016
Vave_Overview_Feb_2016
Vave Solutions
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklist
IITSW Company
 

Tendances (20)

Power automate a workflow automation platform
Power automate a  workflow automation platform Power automate a  workflow automation platform
Power automate a workflow automation platform
 
Power Automate
Power AutomatePower Automate
Power Automate
 
Vave_Overview_Feb_2016
Vave_Overview_Feb_2016Vave_Overview_Feb_2016
Vave_Overview_Feb_2016
 
Intelligent automation with Microsoft Power Automate
Intelligent automation with Microsoft Power AutomateIntelligent automation with Microsoft Power Automate
Intelligent automation with Microsoft Power Automate
 
Robotic Process Automation (RPA) in Manufacturing Industry
Robotic Process Automation (RPA) in Manufacturing IndustryRobotic Process Automation (RPA) in Manufacturing Industry
Robotic Process Automation (RPA) in Manufacturing Industry
 
Power Automate
Power AutomatePower Automate
Power Automate
 
Power platform power automate in a day
Power platform   power automate in a dayPower platform   power automate in a day
Power platform power automate in a day
 
RPA Developer Kickstarter Slide - Day 1.pptx
RPA Developer Kickstarter Slide - Day 1.pptxRPA Developer Kickstarter Slide - Day 1.pptx
RPA Developer Kickstarter Slide - Day 1.pptx
 
Six Sigma/Lean/TOC HR Strategy
Six Sigma/Lean/TOC HR StrategySix Sigma/Lean/TOC HR Strategy
Six Sigma/Lean/TOC HR Strategy
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklist
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 
Best Practices in Major Incident Management
Best Practices in Major Incident ManagementBest Practices in Major Incident Management
Best Practices in Major Incident Management
 
Limitations and Cost of Using Microsoft's Power Platform
Limitations and Cost of Using Microsoft's Power PlatformLimitations and Cost of Using Microsoft's Power Platform
Limitations and Cost of Using Microsoft's Power Platform
 
Introduction to Microsoft Power Platform (PowerApps, Flow)
Introduction to Microsoft Power Platform (PowerApps, Flow)Introduction to Microsoft Power Platform (PowerApps, Flow)
Introduction to Microsoft Power Platform (PowerApps, Flow)
 
Chatbots rpa-ia
Chatbots rpa-iaChatbots rpa-ia
Chatbots rpa-ia
 
Capgemini Consulting: Using Digital Tools to Unlock HR’s True Potential
Capgemini Consulting: Using Digital Tools to Unlock HR’s True PotentialCapgemini Consulting: Using Digital Tools to Unlock HR’s True Potential
Capgemini Consulting: Using Digital Tools to Unlock HR’s True Potential
 
Introduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service managementIntroduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service management
 
Power Platform (Power Automate)
Power Platform (Power Automate)Power Platform (Power Automate)
Power Platform (Power Automate)
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
 
Ramp up project
Ramp up projectRamp up project
Ramp up project
 

Similaire à Swot 1

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
ebuc
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
Bill Burns
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
Carl Booth
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 

Similaire à Swot 1 (20)

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
 
Identity Access Management Fishnet Security
Identity Access Management Fishnet SecurityIdentity Access Management Fishnet Security
Identity Access Management Fishnet Security
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testing
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
Agile scaling using tools hedwig baars
Agile scaling using tools hedwig baarsAgile scaling using tools hedwig baars
Agile scaling using tools hedwig baars
 
AgileCville: How to sell a traditional client on an Agile project plan
AgileCville:  How to sell a traditional client on an Agile project planAgileCville:  How to sell a traditional client on an Agile project plan
AgileCville: How to sell a traditional client on an Agile project plan
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
 
Agiliance Wp Key Steps
Agiliance Wp Key StepsAgiliance Wp Key Steps
Agiliance Wp Key Steps
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Software Outsourcing: Outsource Your Project or Build a Team
Software Outsourcing: Outsource Your Project or Build a TeamSoftware Outsourcing: Outsource Your Project or Build a Team
Software Outsourcing: Outsource Your Project or Build a Team
 

Dernier

Dernier (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

Swot 1

  • 1. SWOT ANALYSIS Implementing a Identity and Access Management System Strengths Weaknesses S W •Cost Benefits •Easier compliance •High investment cost •Built-in Forensic Tools •Misunderstandings •Authentication and about IAM Authorization Opportunities Threats O T •Reduction of costs •No support from top •Future of IAM executives •Compliance with audits •No support outside IT •Incomplete solutions
  • 2. SWOT ANALYSIS Strengths Current strengths of Goals and project IAM plan: strengths •Identity management processes which become automated offer cost benefits -Implement automated IAM • Example: Password resets system to reduce risk and costs cost time and resources at help desk •Create a roadmap and vision •Inbuilt forensic tools •Design architecture of system • Need to find where issue and select components originated during a breach or leak, this is difficult with •Develop release schedule and manual IAM system timeline •Authorization and Authentication • Prove that an individual holds the identity that she/he claims to hold.
  • 3. SWOT ANALYSIS Weaknesses Current weaknesses However: •"Almost 60% of respondents say their High investment costs companies are unable to effectively focus IAM controls on areas of greatest • Many of these business risk" systems do have a high initial cost •"51% Take a reactive approach to security issues" •There are several myths which surround IAM •"58% of companies studied still rely systems on manual controls to audit and control user access to critical • “IAM systems can enterprise systems and data do everything”, and resources, leaving networks open to privacy breaches, failed audits, and “IAM is a potential fraud or misuse of data“ technology only solution” •http://www.informationweek.com/ne ws/show/showArticle.jhtml?articleID= 197800526
  • 4. SWOT ANALYSIS Opportunities Current opportunities Goals and project plan: •Reduction of costs over time Opportunities • Maintaining current tools •Implementing a solid for IM will increase in cost I&AM solution will reduce over time risks and overall costs • Implementing IAM system will reduce costs over time •There are many resources •The future of IAM and IAM solutions • IAM tools will become available from a variety of easier to companies which can use, maintain, and usually be mixed and programs will become matched and worked with consolodated to find the perfect solution •Compliance with audits will be for this company much easier
  • 5. SWOT ANALYSIS Threats Current threats Goals and project plan: threats •No support from top executives • Lack of support from top •Gain the support for implementing a executives makes a solid successful IAM system throughout the IAM soluation almost orgianzation impossible •No support outside IT •Make sure the entire system is • Some believe an IAM system planned and executed in a way so the is only for the IT future vision becomes a reality department. An IAM solution hasa company-wide •Make sure the correct systems are architecture purchased and put in place to make •Incomplete solutions the investment match up with cost- • When only certain pieces of benefit analysis a system are used, the system is not worth the investment usually
  • 6. SWOT ANALYSIS Summary SWOT summary