SlideShare a Scribd company logo
1 of 7
Download to read offline
1 Hitachi ID Group Manager



                                                          Managing the User Lifecycle
                                                          Across On-Premises and
                                                          Cloud-Hosted Applications




Self service management of security group membership.




2 Agenda
  •   Introductions.
  •   Hitachi ID corporate overview.
  •   ID Management Suite overview.
  •   Managing membership in large numbers of AD groups.
  •   The Hitachi ID Group Manager solution.
  •   Animated demonstration.




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.   1
Slide Presentation




3 Hitachi ID Corporate Overview


   Hitachi ID is a leading provider of identity
   and access management solutions.
       • Founded as M-Tech in 1992.
       • A division of Hitachi, Ltd. since 2008.
       • Over 900 customers.
       • More than 11M+ licensed users.
       • Offices in North America, Europe and
         APAC.
       • Partners globally.




4 Representative Hitachi ID Customers




                                                  © 2012 Hitachi ID Systems, Inc.. All rights reserved.       2
Slide Presentation




5 ID Management Suite




6 Problem: Too Many Security Groups
  Medium to large AD environments have             It is challenging to manage group
  thousands of security groups:                    membership on this scale:
     • Control access to printers, shares and          •   User needs constantly change.
       folders.                                        •   Users do not understand groups or ACLs.
     • Membership in mail distribution lists.          •   Users don’t know which groups they need.
                                                       •   Who authorizes membership in each
                                                           group?




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.       3
Slide Presentation




7 Group Manager: Self service management of security group mem-
  bership
  • Hitachi ID Group Manager enables users to request access to network resources such as
    applications or file folders using an intuitive Web-based interface.
  • Behind the scenes, Group Manager creates requests for security group membership and
    automatically tracks authorization by the appropriate stake-holders.
  • Group Manager makes administration of security entitlements simple and efficient and so fosters
    collaboration and reduces security administration workload.




8 Group Manager Features
Hitachi ID Group Manager enables self service administration of user access to network resources –
shares, folders, etc.:
   • Intercept:
        – The Windows "Access Denied" error dialog and send users to the appropriate workflow /
          group membership request screen.
   • Browse:
        – Users find the resources they want using Group Manager.
   • Request:

        – Users ask for access to a resource (no knowledge of groups required).
   • Map:
        – Group Manager maps user requests to group membership.
   • Route:

        – A workflow request is created dynamically and sent to the group’s owner plus anyone else
          specified by policy.
   • Provision:
        – Upon approval, the user is added to the appropriate group.
   • Notify:

        – Users and authorizers are sent thank-you notes.




                                             © 2012 Hitachi ID Systems, Inc.. All rights reserved.       4
Slide Presentation




9 The 50/50 Rule
A simple rule that illustrates cost savings from each Hitachi ID Group Manager feature:



                                                                                                                 Net help desk
    Feature                                            Impact                                                    workload reduction
    Self-service access requests:                      Eliminates 50% of calls.                                  50%
    Simplified resolution of                            Shortens call duration by                                 75%
    access problems:                                   50%.




                                                                                                                 Net workload
    Scenario                                           Impact                                                    reduction
    Conservative estimate:                             50/50                                                     75%
    Optimized deployment:                              60/80                                                     92%




10 Multi-Master Architecture
                                                                      ,
                                                                   nix
                                                                , U 0,
                                                              AD S/39 P,
                                                            d   O DA 0
                                                        e
                                                     tiv or        L S40                                                                     d,
                                                   Na assw ge        A                                                                   st e
                                                     p han              Password
                                                                                                                                      -ho pps
                          User                          c
                                                                        Synch                                                      ud a
                                                                        Trigger                       Target Systems            Clo aaS
                                                                        Systems
                                                                                                                                  S
                                                                                                      with local agent:
                                                                                                      OS/390, Unix,
                                                              PW
                    Reverse                             ate        Hitachi ID                         older RSA
                                                    lid
                    Web Proxy                     Va               Application
           VPN                                                                                            s               Target Systems
                                                                   Server(s)                            ce
           Server                                                                                    rvi                  with remote agent:
 IVR                                                                     SQL
                                                                                                 b Se
 Server                                                                  DB
                                                                                               We                         AD, SQL, SAP, Notes, etc

                                                                                                                          ork
                                       Load
                                                          SQL

                                                                                                                       etw
                                       Balancer           DB

                                                                                                                     lN
                                                                                                                ca
                                           ails                                                               Lo
                                                                                                                                                  Target Systems
                                         Em                                                                                                                r
                                                                                                                                                       nte
                                                                   SQL/Oracle
                                                                                                  Firewall
                                SMTP or
                                                             ke
                                                                ts
                                                                                           r                                                      a Ce
                                Notes Mail               Tic                             ge                                                     t
                                                                                                                                             Da
                                                                                     g
                                                                                 Tri
                                         Incident
                                                               up
                                                                  &
                                                                                                                                        te
   TCP/IP + AES                          Management       Lo
                                                             ok
                                                                                                                                      mo
   Various Protocols
                                         System   System of                                     Firewall                         Re
                                                              Record                                          Proxy Server
   Secure Native Protocol
                                                                                                              (if needed)
   HTTPS




                                                                          © 2012 Hitachi ID Systems, Inc.. All rights reserved.                                    5
Slide Presentation




11 Windows access denied dialog leading to group membership re-
   quest


Animation: ../pics/camtasia/shell-extension/A-Request-Folder.cam4




12 Authorization of a request for security group membership


Animation: ../pics/camtasia/shell-extension/B-Request-Approve.cam4




13 Request approved, user can access the folder


Animation: ../pics/camtasia/shell-extension/C-approve-open-file.cam4




14 ID Management Suite Overview
  • Hitachi ID Group Manager is a component of ID Management Suite.
  • ID Management Suite is designed to streamline management of users and passwords for enterprise
    users.
  • A rich suite of identity and access management products, with over 11M licensed users, that can:
      –   Discover and connect user objects from every system.
      –   Streamline administration of users, entitlements and login credentials.
      –   Construct and maintain OrgChart data.
      –   Secure access to privileged accounts on thousands of systems.




                                               © 2012 Hitachi ID Systems, Inc.. All rights reserved.       6
Slide Presentation




               15 Summary
                 Hitachi ID Group Manager helps organizations to more quickly, efficiently and intuitively manage
                 membership in large numbers of Active Directory groups:
                      •   Users focus on network resources, not groups.
                      •   Group owners, not IT, authorize requests for resource access.
                      •   IT security administrators manage the process, not individual requests.
                      •   Auditors can monitor current group membership and how users came to have the rights they do.
                 Learn more at Hitachi-ID.com/Group-Manager.
                 ... or ... E-mail sales@Hitachi-ID.com




500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com


                                                                                              File: PRCS:pres
www.Hitachi-ID.com                                                                            Date: March 1, 2012

More Related Content

More from Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (20)

Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Hitachi ID Group Manager: Reduce support cost with self-service AD group management

  • 1. 1 Hitachi ID Group Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Self service management of security group membership. 2 Agenda • Introductions. • Hitachi ID corporate overview. • ID Management Suite overview. • Managing membership in large numbers of AD groups. • The Hitachi ID Group Manager solution. • Animated demonstration. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 2. Slide Presentation 3 Hitachi ID Corporate Overview Hitachi ID is a leading provider of identity and access management solutions. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 900 customers. • More than 11M+ licensed users. • Offices in North America, Europe and APAC. • Partners globally. 4 Representative Hitachi ID Customers © 2012 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 3. Slide Presentation 5 ID Management Suite 6 Problem: Too Many Security Groups Medium to large AD environments have It is challenging to manage group thousands of security groups: membership on this scale: • Control access to printers, shares and • User needs constantly change. folders. • Users do not understand groups or ACLs. • Membership in mail distribution lists. • Users don’t know which groups they need. • Who authorizes membership in each group? © 2012 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 4. Slide Presentation 7 Group Manager: Self service management of security group mem- bership • Hitachi ID Group Manager enables users to request access to network resources such as applications or file folders using an intuitive Web-based interface. • Behind the scenes, Group Manager creates requests for security group membership and automatically tracks authorization by the appropriate stake-holders. • Group Manager makes administration of security entitlements simple and efficient and so fosters collaboration and reduces security administration workload. 8 Group Manager Features Hitachi ID Group Manager enables self service administration of user access to network resources – shares, folders, etc.: • Intercept: – The Windows "Access Denied" error dialog and send users to the appropriate workflow / group membership request screen. • Browse: – Users find the resources they want using Group Manager. • Request: – Users ask for access to a resource (no knowledge of groups required). • Map: – Group Manager maps user requests to group membership. • Route: – A workflow request is created dynamically and sent to the group’s owner plus anyone else specified by policy. • Provision: – Upon approval, the user is added to the appropriate group. • Notify: – Users and authorizers are sent thank-you notes. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 5. Slide Presentation 9 The 50/50 Rule A simple rule that illustrates cost savings from each Hitachi ID Group Manager feature: Net help desk Feature Impact workload reduction Self-service access requests: Eliminates 50% of calls. 50% Simplified resolution of Shortens call duration by 75% access problems: 50%. Net workload Scenario Impact reduction Conservative estimate: 50/50 75% Optimized deployment: 60/80 92% 10 Multi-Master Architecture , nix , U 0, AD S/39 P, d O DA 0 e tiv or L S40 d, Na assw ge A st e p han Password -ho pps User c Synch ud a Trigger Target Systems Clo aaS Systems S with local agent: OS/390, Unix, PW Reverse ate Hitachi ID older RSA lid Web Proxy Va Application VPN s Target Systems Server(s) ce Server rvi with remote agent: IVR SQL b Se Server DB We AD, SQL, SAP, Notes, etc ork Load SQL etw Balancer DB lN ca ails Lo Target Systems Em r nte SQL/Oracle Firewall SMTP or ke ts r a Ce Notes Mail Tic ge t Da g Tri Incident up & te TCP/IP + AES Management Lo ok mo Various Protocols System System of Firewall Re Record Proxy Server Secure Native Protocol (if needed) HTTPS © 2012 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 6. Slide Presentation 11 Windows access denied dialog leading to group membership re- quest Animation: ../pics/camtasia/shell-extension/A-Request-Folder.cam4 12 Authorization of a request for security group membership Animation: ../pics/camtasia/shell-extension/B-Request-Approve.cam4 13 Request approved, user can access the folder Animation: ../pics/camtasia/shell-extension/C-approve-open-file.cam4 14 ID Management Suite Overview • Hitachi ID Group Manager is a component of ID Management Suite. • ID Management Suite is designed to streamline management of users and passwords for enterprise users. • A rich suite of identity and access management products, with over 11M licensed users, that can: – Discover and connect user objects from every system. – Streamline administration of users, entitlements and login credentials. – Construct and maintain OrgChart data. – Secure access to privileged accounts on thousands of systems. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 7. Slide Presentation 15 Summary Hitachi ID Group Manager helps organizations to more quickly, efficiently and intuitively manage membership in large numbers of Active Directory groups: • Users focus on network resources, not groups. • Group owners, not IT, authorize requests for resource access. • IT security administrators manage the process, not individual requests. • Auditors can monitor current group membership and how users came to have the rights they do. Learn more at Hitachi-ID.com/Group-Manager. ... or ... E-mail sales@Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: PRCS:pres www.Hitachi-ID.com Date: March 1, 2012