IDM365 is developed for medium and large-scaled businesses, the user-centric interface allows business critical decisions to be made right where the knowledge and information is while keeping IT and Management in control.
The IDM365 Identity and Access Management backend can connect to almost any system or application on the market and provides the flexibility to adapt to each client's business. We have developed tools which allow us to speed up the implementation process, ensuring minimum costs while maintaining maximum accuracy and control.
www.idm365.com
2. idm365.com
PRESENTATION CONTENT
IDM365
IAM Software and Standards
IDM365
You and Our Key Features
IDM365
ROI & Implementation
IDM365
Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
3. idm365.com
Identify users
Control user access
Determine user privileges
Delegate administrative authorities
IDM365 – IAM SOLUTION
Implementing IDM365 Identity Access Management solutions
will automate and streamline your companies‘ employees‘ full
life cycle
4. idm365.com
IDM365 INFORMATION SECURITY
Identity & Access Management solutions
can increase your company‘s information
security in many ways.
Control and overview over employee‘s
accounts and access rights
Security policies can be efficiently
implemented through work flows
Information security policies can be
centrally managed
Breach of data
Source: PwC 2014 report
“And it’s important to note that insider threats are not necessarily a ‘bad
guy with bad intentions; it could be a good employee doing righteous work
in an insecure manner. Our problems are more human than technological.”
~ Michael E Mason, Chief Security Officer for Verizon
5. idm365.com
SOME RELEVANT GLOBAL REGULATIONS
Finance Public
Sector
Pharma & Life
Science
Energy &
Utilities
Technology
and
Manufacturin
g
Sarbanes-Oxley Act of 2002 (SOX) Important Important
Basel II Important
ISO 27001 Important Important Important Important
Data Protection and Privacy Important Important
CoCo Important Important
PCI Important Important
NERC Important
FDA Important Important
FCPA Important Important
7. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED
Data maintenance and consistent
alignment between systems
Actions of users
Identities
Entitlements
Activity
Identity can be
managed by IDM365
Unique identifier and user info
IDM365 provides full
control of entitlements
Rights of use
!
!
!
Example:
Audit trails on all systems,
reports on all identities
8. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARED
IAM
Functions
Key
Components
Business
Value
Identity
Data
Data maintenance and consistent
alignment between systems
Identities
Entitlements
Activity
Identity can be
managed by IDM365
IDM365 provides full
control of entitlements
!
!
!
Example:
Audit trails on all systems,
reports on all identities
9. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions
Key
Components
Business
Value
Identity
Data
Gives control to the
decision maker
Bulk user processing
Enables flexible
utilization of resources
Effectiveness
Efficiency
Enablement
!
!
!
Example:
Standardization of
workflows, built-in SoD’s
10. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions
Key
Components
Business
Value
Identity
Data
Organization
Processes
Technology
Example:
Temporary access handling,
Offline system support
Customizable, process based
workflows and on-off board!
Organizational control
and overview directly
within IDM365
!
Integrates with all systems
via standard API!
11. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions
Key
Components
Business
Value
Identity
Data
Access
Intelligence
Administration
Example:
Adapts to your
business terminology
IDM365 provides rule based
approval workflows with SoD controls
and, automated attribute based
permission assignment.
!
IDM365 – access; anywhere, at
anytime, on any device !
IDM365 gives full user
lifecycle management !
12. idm365.com
GARTNER IAM AND IDM365 FUNCTIONALITY COMPARISON
IAM
Functions
Key
Components
Business
Value
Identity
Data
!
!
!
!
!
!
!
!
! !
!
!
13. idm365.com
WHAT DOES IDM365 DO FOR YOU?
IDM365
IAM Software and Standards
IDM365
You and Our Key Features
IDM365
ROI & Implementation
IDM365
Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
14. idm365.com
10 Key IDM365 Features* - by ITMC
1 Intuitive User-centric Interface
Simple to use. Time savings. Cost savings.
2
Responsible Self-service IAG software
Those who have authority and hands-on info
can do the User Management.
3
Segregation of Duties (SoD)
SoD is built into the framework. Meets
compliance demands. E.g. Purchasing Job
Function should not also have Invoicing JF.
4
Fast Implementation and Control
IDM365 CLEAN / IDM365 ORGANIZE analyzes
the data structure and recommends a new.
5
Compliance
Enables businesses to comply with all regulatory
demands (SOX, BASEL, ISO 27001, etc.).
6
Turn audits into a time to shine
Keeps you compliant and audit ready always.
Reports anytime.
7
Help “videos”
Video tutorials (30 and growing). Covers most
user procedures. Watch one or all.
8
Keep you in control
One interface one truth. IDM365 can be acting
as your “Single Point of Truth”.
9
Support
Decades of experience and focus makes us
specialist. Annual updates are included.
10
Cost
Simple pricing. No unexpected add-ons. Cost
saving implementation tools. Big ROI.
15. idm365.com
SIMPLE BUT SECURE WORKFLOWS
Onboarding
Job Function:
Accounting
Assistant
!
!
!
!
1 2
HR creates user and
requests access
One or more
managers approve
5 min
Job Function:
Financial
Management
Reporting
?
?
5 -10 min
1 2
Manager requests
Additional access for user
One or more job
function owners approve
3
Job Function:
Accounting
Assistant
Job Function:
Financial
Management
Reporting
!
!
This system critical request requires
approval from the system owner.
IDM365 sends request automatically
Modification (add role, function, or attribute)
3
System intelligence
recognizes SoD
violation.
Soft/hard stop
4
System intelligence
recognizes SoD
violation.
Soft/hard stop
16. idm365.com
IDM365 gives you happy employees
A typical scenario:
IT
days later...
HR
Manager
HR and so on...
Manager
HR
Manager Account
Sponsor
5 minutes
later...
approve
IDM365Here’s the path an email request might take
before your new employee gets access
17. idm365.com
MAKING THE COMPLEX SIMPLE
IDM365
IAM Software and Standards
IDM365
You and Our Key Features
IDM365
ROI & Implementation
IDM365
Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IAM Comparison
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
18. idm365.com
RBAC/ABAC HYBRID
RBAC
RBAC / ABAC
Hybrid
Jason
Philipson
Sales Manager
UK
Role 1
Sales Manager
NL
Role 2
Jason
Philipson
Sales
ManagerJF
Location:
NL
Location:
UK
Customized job function for every user
Takes time, adds risk.
Standardized job functions and attributes
The user will receive only the access he needs.
19. idm365.com
IDM365
RBAC / ABAC Hybrid Vs Role Based Access Control
required roles: 20
IDM365
Internal
multi-function
employee
Job Function:
Purchasing
Manager
(travels as consultant
to overseas branch)
Job Function:
Sales Team
UK office
Job Function:
Sales Team
Location:
Germany
Germany office
A simple organization with only
20 job titles and 20 locations
required roles: 400
20. idm365.com
IDM365 CONNECTION METHODS
We consume API’s
Standard API
A majority of API’s exists or can
be created (see ITMC API
standard document).
(incl. in license price)
Custom API
API specifically developed
by ITMC
(not incl. in license price)
API helps create
delete & modify
user in system
IDM365 starts workflow and sends
email to system owner to create user,
IDM365 registers creation and logs in
audit trail.
System
owner
Offline System
System is offline, or
is treated as an offline system.
21. idm365.com
Choose between 11 built-in reports
Add other available standard reports
from the Standard report document
Add client custom reports on demand
IDM365 AUDIT
Example:
Deviation Report
Shows deviation between
IDM365, and system as
well as reason.
IDM365 real-time reporting
22. idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
CIO
Sales
Manager Manager
Finance
Manager
23. idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
24. idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
25. idm365.com
BEST PRACTISE IMPLEMENTATION
Rapid implementation – 30 days implementation process
2 IDM365:Clean tool - PDF/Excel
3 IDM365:Organize tool -PDF/Excel
4 IDM365:Audit system setup
1 Determine business and system scope.
CIO
Sales
Manager Manager
Finance
Manager
26. idm365.com
You can cut your dependency on us from
day to day — just “unplug” it.
No dependency
No long extraction period
Your in control
But we bet you won’t, because our
software does exactly what you want it to.
WE TRUST THAT WE HAVE THE BEST IAM SOFTWARE
We think that you will love our product so much, that…
27. idm365.com
COST SAVINGS AND BENEFITS
IDM365
IAM Software and Standards
IDM365
You and Our Key Features
IDM365
ROI & Implementation
IDM365
Concepts, methods and reporting
IAM Comparison
IAM Standards
IAM Software
IDM365 Self Service
IDM365 Workflow
10 Key IDM365 Features
IDM365 Reporting
Connection Methods
RBAC ABAC and Hybrid
IDM365 benefits and support
IDM365 Implementation
IDM365 ROI
IDM365 Help Videos
28. idm365.com
CONTROL THE PROCESS
1. Workshop involving IT management and relevant business
management. Max 2 hours
2. Workshop involving relevant IT management and relevant system
management. Max 2 hours
3. Prepared by IDM365 project manager and consolidated with
Client project manager
4. The IDM:Clean analysis tool is then utilized to generate reports for
each individual system involved. Output can be imported directly
in system
5. Identifying the job functions performed under each department
or team, and the permissions they require; suitable
representatives for each department will therefore be identified
6. System is setup by the IDM365 experts
7. Testing system before roll-out is essential, in order to make sure
that testing takes all scenarios into consideration. Performed by
client
8. Beta Roll-out is used to ensure a successful Final Roll-out
9. Final Roll-out – Training - certification
1.#Determine#Business#Scope#
2.#Determine#System#Scope#
3.#Determine#Implementa8on#Plan#
4.#Complete#IDM:Clean*##
5.#Complete#IDM:Organize*#
6.#Complete#IDM365#System#Setup#
7.#Complete#Tes8ng#
8.#Beta#RollHout#
9.#Final#RollHout#
*Auto generated
29. idm365.com
IDM365 BENEFITS
1
2
3
4
Minimize time spent on on-
boarding by up to 90%
Move workload from IT to
business
Built in audit trail for all
users on all systems
Gain business overview
5
6
7
8
Extensive reporting tool
Achieve good governance
and minimize risk
Speed up implementation
time on new systems
License alignment
9
10
11
12
30 day implementation
process
Highten security
Save money
Gain flexibility with
RBAC/ABAC hybrid
30. idm365.com
Training during implementation
phases
Training of Super Users + certification
Video training on roll out
Complete Service Catalogue with
options for every need
Rich follow up after implementation
ENSURE SUCCESS
How we support success
70% of all IT system introductions
fail because of lacking “ease of use”
We make sure you are guided in
every step of the way
31. idm365.com
Choose the service that fits you, from our vast
Service Catalogue:
Get a Custom Service package that fits you.
(E.g. Workflows, Job function setup …)
Choose service by the hour
IDM365 SERVICE
Let us help you – we do it every day
Due to unique insight and specialist knowledge, we can
ensure that you are compliant with your compliance demands
on user management.
Do what you like to do, let us do the rest