SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Top Reasons Why Identity Management
Projects Fail and How to Avoid Them
Mali Vanamali
CA Services
Principal Services Architect
North America Security and Compliance Practice
2 © 2015 CA. ALL RIGHTS RESERVED.
Agenda
I n t r o d u c t i o n
O v e r v i e w
Q & A
K e y R e a s o n s f o r I D M P r o j e c t F a i l u r e
4
1
2
3
3 © 2015 CA. ALL RIGHTS RESERVED.
 Underlying business process
 Types of user population
 Defining entitlements to match job function
 Business rules for provisioning
WHAT MAKES IDENTITY MANAGEMENT PROJECTS COMPLEX?
4 © 2015 CA. ALL RIGHTS RESERVED.
REASON 5
Not enough
testing
REASON 4
Trying to do more
in less time
REASON 3
Lack of role
definition
REASON 2
80/20 Rules
not followed
REASON 1
Scope creep-
Moving target
Key Reasons for IDM Project Failure
5 © 2015 CA. ALL RIGHTS RESERVED.
Key Reasons for IDM Project Failure
5
4
3
2
1
Trying to do more in less time
Lack of role definition
80/20 rules not followed
Scope Creep / Moving Target
Not enough testing
6 © 2015 CA. ALL RIGHTS RESERVED.
Reason 5- Not Enough Testing
TEST TEST AND TEST AGAIN.
Scope of testing is narrow
Real data is not used in testing
Too much focus on negative testing
Time allocated for testing is limited
5
7 © 2015 CA. ALL RIGHTS RESERVED.
Reason 4- Trying to do more with less
DID YOU FORGET
SOMETHING???
Overload Requirements
Project end date too aggressive
Underestimated functional
requirements
Lack of coexistence strategy
4
8 © 2015 CA. ALL RIGHTS RESERVED.
Reason 3- Half Hearted measures
Engage the business
Lack of automation
Lack of birthright role definition
Unwillingness to re-engineer business
processes
3
9 © 2015 CA. ALL RIGHTS RESERVED.
Reason 2- 80/20 Rule not followed
CLASSIC PARETO PRINCIPLE
Don’t try to fit a square peg in a round
hole
Lack of business involvement
Treated as a technical challenge not a
business solution2
10 © 2015 CA. ALL RIGHTS RESERVED.
Reason 1- Scope creep, shooting a moving target
New requirements added throughout
project lifecycle
Accommodating organization changes
Accommodating UI/UX changes
1
Level set expectations
11 © 2015 CA. ALL RIGHTS RESERVED.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Continuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QAContinuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QA
Jeff Sussna
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
Gene Kim
 
Company Overview
Company OverviewCompany Overview
Company Overview
Tom Mueck
 

Was ist angesagt? (20)

Tech Talk: The New CA Application Performance Management Team Center—Faster T...
Tech Talk: The New CA Application Performance Management Team Center—Faster T...Tech Talk: The New CA Application Performance Management Team Center—Faster T...
Tech Talk: The New CA Application Performance Management Team Center—Faster T...
 
Test Automation In The Hands of "The Business"
Test Automation In The Hands of "The Business"Test Automation In The Hands of "The Business"
Test Automation In The Hands of "The Business"
 
Continuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QAContinuous Quality: What DevOps Means for QA
Continuous Quality: What DevOps Means for QA
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
 
Moving to Continuous Delivery with XebiaLabs XL Release
Moving to Continuous Delivery with XebiaLabs XL ReleaseMoving to Continuous Delivery with XebiaLabs XL Release
Moving to Continuous Delivery with XebiaLabs XL Release
 
DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet? DOES SFO 2016 - Marc Priolo - Are we there yet?
DOES SFO 2016 - Marc Priolo - Are we there yet?
 
Leading the Transformation: Stories from the Trenches
Leading the Transformation: Stories from the TrenchesLeading the Transformation: Stories from the Trenches
Leading the Transformation: Stories from the Trenches
 
Tech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps TransformationTech Mahindra ADOPT©: Accelerate DevOps Transformation
Tech Mahindra ADOPT©: Accelerate DevOps Transformation
 
DevOps - Why 50 deploys per day is essential
DevOps - Why 50 deploys per day is essentialDevOps - Why 50 deploys per day is essential
DevOps - Why 50 deploys per day is essential
 
Continuous Testing: A Key to DevOps Success
Continuous Testing: A Key to DevOps SuccessContinuous Testing: A Key to DevOps Success
Continuous Testing: A Key to DevOps Success
 
Performance Testing in Agile and DevOps Environments
Performance Testing in Agile and DevOps EnvironmentsPerformance Testing in Agile and DevOps Environments
Performance Testing in Agile and DevOps Environments
 
DevOps drivein - Mind the Gap
DevOps drivein - Mind the GapDevOps drivein - Mind the Gap
DevOps drivein - Mind the Gap
 
SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...
SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...
SRE-iously: Defining the Principles, Habits, and Practices of Site Reliabilit...
 
Rapid Strategic SRE Assessments
Rapid Strategic SRE AssessmentsRapid Strategic SRE Assessments
Rapid Strategic SRE Assessments
 
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
 
Shifting Left: The Evolution of Test Automation
Shifting Left: The Evolution of Test AutomationShifting Left: The Evolution of Test Automation
Shifting Left: The Evolution of Test Automation
 
Agile Network India | Understanding the importance of a full featured CI/CD p...
Agile Network India | Understanding the importance of a full featured CI/CD p...Agile Network India | Understanding the importance of a full featured CI/CD p...
Agile Network India | Understanding the importance of a full featured CI/CD p...
 
Foundations of the Scaled Agile Framework 3.0
Foundations of the Scaled Agile Framework 3.0Foundations of the Scaled Agile Framework 3.0
Foundations of the Scaled Agile Framework 3.0
 
Shift Left Quality Assurance: How to do it. Why it matters.
Shift Left Quality Assurance: How to do it. Why it matters.Shift Left Quality Assurance: How to do it. Why it matters.
Shift Left Quality Assurance: How to do it. Why it matters.
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Ähnlich wie Top Reasons Why Identity Management Projects Fail & How to Avoid Them

Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
AgileNetwork
 
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation TechniquesDriving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Susan Schanta
 
The Role of Lean Six Sigma in Contact Centers
The Role of Lean Six Sigma in Contact CentersThe Role of Lean Six Sigma in Contact Centers
The Role of Lean Six Sigma in Contact Centers
Art Hall
 
Integrated requirements process
Integrated requirements processIntegrated requirements process
Integrated requirements process
ITSHIFT
 

Ähnlich wie Top Reasons Why Identity Management Projects Fail & How to Avoid Them (20)

FCB Partners Webinar: Measure What Matters
FCB Partners Webinar: Measure What Matters FCB Partners Webinar: Measure What Matters
FCB Partners Webinar: Measure What Matters
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Useful stepping stones in growth towards Agile testing by Kees Blokland
Useful stepping stones in growth towards Agile testing by Kees BloklandUseful stepping stones in growth towards Agile testing by Kees Blokland
Useful stepping stones in growth towards Agile testing by Kees Blokland
 
How_to_integrate_ISO_9001_2015_and_ISO_14001_2015_webinar_presentation_deck.pdf
How_to_integrate_ISO_9001_2015_and_ISO_14001_2015_webinar_presentation_deck.pdfHow_to_integrate_ISO_9001_2015_and_ISO_14001_2015_webinar_presentation_deck.pdf
How_to_integrate_ISO_9001_2015_and_ISO_14001_2015_webinar_presentation_deck.pdf
 
Baskaren Accomplishments Summary
Baskaren Accomplishments SummaryBaskaren Accomplishments Summary
Baskaren Accomplishments Summary
 
7 Steps to Avoiding Project Failure | Mark Stuyt
7 Steps to Avoiding Project Failure | Mark Stuyt7 Steps to Avoiding Project Failure | Mark Stuyt
7 Steps to Avoiding Project Failure | Mark Stuyt
 
An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)
 
Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
Agile Gurugram 2023 I Simplified Agile EVM - The Art of Managing Triple Const...
 
How Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application EconomyHow Active Automation can Deliver in the Application Economy
How Active Automation can Deliver in the Application Economy
 
FCB Partners Course Preview: Process Owners in Action
FCB Partners Course Preview:  Process Owners in ActionFCB Partners Course Preview:  Process Owners in Action
FCB Partners Course Preview: Process Owners in Action
 
Measure Customer and Business Feedback to Drive Improvement
Measure Customer and Business Feedback to Drive ImprovementMeasure Customer and Business Feedback to Drive Improvement
Measure Customer and Business Feedback to Drive Improvement
 
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCase Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business Value
 
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation TechniquesDriving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
 
Actionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service ManagementActionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service Management
 
The Role of Lean Six Sigma in Contact Centers
The Role of Lean Six Sigma in Contact CentersThe Role of Lean Six Sigma in Contact Centers
The Role of Lean Six Sigma in Contact Centers
 
PMO in an Agile World
PMO in an Agile WorldPMO in an Agile World
PMO in an Agile World
 
7 Steps for Sustainable Adoption (SharePoint- and Project Server-based PMIS)
7 Steps for Sustainable Adoption (SharePoint- and Project Server-based PMIS)7 Steps for Sustainable Adoption (SharePoint- and Project Server-based PMIS)
7 Steps for Sustainable Adoption (SharePoint- and Project Server-based PMIS)
 
Managing requirements through the lifecycle of an agile project
Managing requirements through the lifecycle of an agile projectManaging requirements through the lifecycle of an agile project
Managing requirements through the lifecycle of an agile project
 
Integrated requirements process
Integrated requirements processIntegrated requirements process
Integrated requirements process
 

Mehr von CA Technologies

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Top Reasons Why Identity Management Projects Fail & How to Avoid Them

  • 1. Top Reasons Why Identity Management Projects Fail and How to Avoid Them Mali Vanamali CA Services Principal Services Architect North America Security and Compliance Practice
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED. Agenda I n t r o d u c t i o n O v e r v i e w Q & A K e y R e a s o n s f o r I D M P r o j e c t F a i l u r e 4 1 2 3
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.  Underlying business process  Types of user population  Defining entitlements to match job function  Business rules for provisioning WHAT MAKES IDENTITY MANAGEMENT PROJECTS COMPLEX?
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED. REASON 5 Not enough testing REASON 4 Trying to do more in less time REASON 3 Lack of role definition REASON 2 80/20 Rules not followed REASON 1 Scope creep- Moving target Key Reasons for IDM Project Failure
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED. Key Reasons for IDM Project Failure 5 4 3 2 1 Trying to do more in less time Lack of role definition 80/20 rules not followed Scope Creep / Moving Target Not enough testing
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED. Reason 5- Not Enough Testing TEST TEST AND TEST AGAIN. Scope of testing is narrow Real data is not used in testing Too much focus on negative testing Time allocated for testing is limited 5
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED. Reason 4- Trying to do more with less DID YOU FORGET SOMETHING??? Overload Requirements Project end date too aggressive Underestimated functional requirements Lack of coexistence strategy 4
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED. Reason 3- Half Hearted measures Engage the business Lack of automation Lack of birthright role definition Unwillingness to re-engineer business processes 3
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED. Reason 2- 80/20 Rule not followed CLASSIC PARETO PRINCIPLE Don’t try to fit a square peg in a round hole Lack of business involvement Treated as a technical challenge not a business solution2
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED. Reason 1- Scope creep, shooting a moving target New requirements added throughout project lifecycle Accommodating organization changes Accommodating UI/UX changes 1 Level set expectations
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED. Questions?