SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Automated Security
Entitlement System
Traditional access management
• Challenge:
• permission
management for
shared resources
across corporate
networks.
• Sources of data:
• Shared network drives
• Mainframes
• Cloud
• DB2
Individualapplicationsfor eachdata source
• Problems include:
• Time wasted through
repetitive data entry
• Non-standardized
permissions between
employees in same role.
• Slow, inefficient, manual
rights administration
• Locally stored forms often
outdated and inaccurate
Productivity impacts
• For each employee,
obtaining complete
access to all
necessary shared
resources can take up
to one month.
• Lost productivity
compounds over
number of new
employees per
month.
Audit trail
• Each individual access
application has multiple
approvers.
• Approval details often
stored on local
spreadsheets or in email,
making audits difficult,
slow and expensive.
Rights rescission
• Manual rights
administration
combined with audit
trail challenges =
delays in removing
rights upon
employee
termination or role
change.
• Unauthorized access
= liability.
Solution:
AutomatedSecurity EntitlementSystem
• Characteristics:
• Single, centralized database housing
current versions of all forms.
• Single website linking to forms organized
by employee title.
• Automatic emails sent to approvers with
bundled applications.
• Streamlined approval or rescission
process.
• Connectors automatically push approvals
or rescissions to data sources.
• Approvals or rescissions stored in database
for audit trail.
Solution:
AutomatedSecurity EntitlementSystem
• Off-The-Shelf Solutions:
• Oracle Identity Manager Solution
• CA Identity Manager
• NetIQ Governance Suite
• SRI Custom Built Solutions:
• Top to bottom identity management systems
• Proprietary connectors to connect to Teradata,
Trivoli & Hadoop
Solution:
AutomatedSecurity EntitlementSystem
• Benefits
• Centralized, official location for all forms
= up to date permissions
• Forms bundled via job role = uniform
rights across enterprise.
• Employee information obtained from
Microsoft Single Sign On = efficiency.
• Single application sent to approvers =
efficiency.
• Approvals & rescissions completed with
one click = improved risk management.
• Approvals stored in central database =
easier audit compliance & completion.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

SyedAhmed
SyedAhmedSyedAhmed
SyedAhmed
Ahmed Syed
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
Steve Crawford
 
Sateesh DCTM 5+ Years
Sateesh DCTM 5+ YearsSateesh DCTM 5+ Years
Sateesh DCTM 5+ Years
satish kumar
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
Webx
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
Saravanan Purushothaman
 

Was ist angesagt? (19)

Windows 7 Make People Productive Anywhere
Windows 7 Make People Productive AnywhereWindows 7 Make People Productive Anywhere
Windows 7 Make People Productive Anywhere
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
HP OM
HP OMHP OM
HP OM
 
SyedAhmed
SyedAhmedSyedAhmed
SyedAhmed
 
Mirroring and replications
Mirroring and replicationsMirroring and replications
Mirroring and replications
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 
AppSense Product Deck
AppSense Product DeckAppSense Product Deck
AppSense Product Deck
 
Architecture patterns overview
Architecture patterns overviewArchitecture patterns overview
Architecture patterns overview
 
VMware View - Marek BraĹžina
VMware View - Marek BraĹžinaVMware View - Marek BraĹžina
VMware View - Marek BraĹžina
 
User Virtualization with AppSense
User Virtualization with AppSenseUser Virtualization with AppSense
User Virtualization with AppSense
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
 
Sateesh DCTM 5+ Years
Sateesh DCTM 5+ YearsSateesh DCTM 5+ Years
Sateesh DCTM 5+ Years
 
Chapter04 automated tools for systems development
Chapter04 automated tools for systems developmentChapter04 automated tools for systems development
Chapter04 automated tools for systems development
 
Livebase: a database for the web 2.0
Livebase: a database for the web 2.0Livebase: a database for the web 2.0
Livebase: a database for the web 2.0
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 

Andere mochten auch

Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
David Brossard
 
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Technology
 

Andere mochten auch (7)

Automated Securities Accounting System
Automated Securities Accounting System Automated Securities Accounting System
Automated Securities Accounting System
 
Cloud Migration Projects & Capabilities
Cloud Migration Projects & CapabilitiesCloud Migration Projects & Capabilities
Cloud Migration Projects & Capabilities
 
WebRTC: Efficiency, Loyalty & Flexibility
WebRTC: Efficiency, Loyalty & FlexibilityWebRTC: Efficiency, Loyalty & Flexibility
WebRTC: Efficiency, Loyalty & Flexibility
 
Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
 
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
 
2014 Mobile Reading Research
2014 Mobile Reading Research 2014 Mobile Reading Research
2014 Mobile Reading Research
 

Ähnlich wie IDM and Automated Security Entitlement Systems

Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeksSynergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis Engineering Design Solutions
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
jemtallon
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
Mentalist Akram
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
Sectricity
 
Planning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPMPlanning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPM
WASdev Community
 

Ähnlich wie IDM and Automated Security Entitlement Systems (20)

Fishbowl's Packaged Tools for WebCenter Automation
Fishbowl's Packaged Tools for WebCenter AutomationFishbowl's Packaged Tools for WebCenter Automation
Fishbowl's Packaged Tools for WebCenter Automation
 
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeksSynergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
 
sequel for biginners.pptx
sequel for biginners.pptxsequel for biginners.pptx
sequel for biginners.pptx
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Threats
ThreatsThreats
Threats
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
dbms ppt.pptx database management system
dbms ppt.pptx database management systemdbms ppt.pptx database management system
dbms ppt.pptx database management system
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
PPT
PPTPPT
PPT
 
Planning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPMPlanning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPM
 
142 wendy shank
142 wendy shank142 wendy shank
142 wendy shank
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)
 
Data Vault Automation at the Bijenkorf
Data Vault Automation at the BijenkorfData Vault Automation at the Bijenkorf
Data Vault Automation at the Bijenkorf
 
Distributed data processing
Distributed data processingDistributed data processing
Distributed data processing
 
Unit 2 oracle9i
Unit 2  oracle9i Unit 2  oracle9i
Unit 2 oracle9i
 

KĂźrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

KĂźrzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

IDM and Automated Security Entitlement Systems

  • 2. Traditional access management • Challenge: • permission management for shared resources across corporate networks. • Sources of data: • Shared network drives • Mainframes • Cloud • DB2
  • 3. Individualapplicationsfor eachdata source • Problems include: • Time wasted through repetitive data entry • Non-standardized permissions between employees in same role. • Slow, inefficient, manual rights administration • Locally stored forms often outdated and inaccurate
  • 4. Productivity impacts • For each employee, obtaining complete access to all necessary shared resources can take up to one month. • Lost productivity compounds over number of new employees per month.
  • 5. Audit trail • Each individual access application has multiple approvers. • Approval details often stored on local spreadsheets or in email, making audits difficult, slow and expensive.
  • 6. Rights rescission • Manual rights administration combined with audit trail challenges = delays in removing rights upon employee termination or role change. • Unauthorized access = liability.
  • 7. Solution: AutomatedSecurity EntitlementSystem • Characteristics: • Single, centralized database housing current versions of all forms. • Single website linking to forms organized by employee title. • Automatic emails sent to approvers with bundled applications. • Streamlined approval or rescission process. • Connectors automatically push approvals or rescissions to data sources. • Approvals or rescissions stored in database for audit trail.
  • 8. Solution: AutomatedSecurity EntitlementSystem • Off-The-Shelf Solutions: • Oracle Identity Manager Solution • CA Identity Manager • NetIQ Governance Suite • SRI Custom Built Solutions: • Top to bottom identity management systems • Proprietary connectors to connect to Teradata, Trivoli & Hadoop
  • 9. Solution: AutomatedSecurity EntitlementSystem • Benefits • Centralized, official location for all forms = up to date permissions • Forms bundled via job role = uniform rights across enterprise. • Employee information obtained from Microsoft Single Sign On = efficiency. • Single application sent to approvers = efficiency. • Approvals & rescissions completed with one click = improved risk management. • Approvals stored in central database = easier audit compliance & completion.