http://hclte.ch/If33g9 - IT Management Tools
http://www.hcltech.com/ - More on HCL Technologies
Terrorist sabotage. Identity theft. Credit card fraud. Corporate malfeasance. Privacy violations. Many critical problems facing society today involve unauthorized access to, and use of personal and other confidential data. Managing users' identities and entitlements has become increasingly complex as enterprises allow employees, contractors, partners, suppliers and customers access to their systems and information. Most of the organiations are looking at IAM to be more "Business Agile", increase their "Operational and Business efficiency" and to stay "Compliant". It is imperative that enterprises initiate, develop and define ongoing IAM programs. HCL’s significant understanding of both business as well as technology makes it an ideal partner to help create business-relevant road maps and solutions to address an enterprises’ identity and access management needs. Our IAM practice has developed methodologies for helping enterprises comply with rigorous compliance deadlines without compromising efforts implementing their strategic road map.
1. Identity and Access
Management Services
Terrorist Sabotage
Identity Theft
Credit Card Fraud
Corporate Malfeasance
Identity Theft
HCL Information Security Practice
2. Why to go for
IAM Services ?
Terrorist sabotage. Identity theft. Credit card fraud. Corporate malfeasance. Privacy violations. Many critical problems
facing society today involve unauthorized access to, and use of personal and other confidential data. Managing users'
identities and entitlements has become increasingly complex as enterprises allow employees, contractors, partners,
suppliers and customers access to their systems and information. At the same time, enterprises have been under increasing
pressure to ensure that they manage users' identity and access in compliance with new legislation and regulation — and be
able to demonstrate that they do so. Moreover, the demands of regulatory compliance are driving corporate IT and security
managers to improve their process for governing user access. What is keeping them awake most of all, however, is not just
regulatory compliance but the entire array of serious problems that can result from their inability to see who has access to
which information resources, to manage access change as user job responsibilities change, to maintain audit trails, and to
ensure that all users have access that is appropriate for their job function.
From our experience and various customer engagements we can state that most of the customers are looking at IAM to be
more "Business Agile", increase their "Operational and Business efficiency" and to stay "Compliant". It is imperative that
enterprises initiate, develop and define ongoing IAM programs. They must then continuously improve and then maintain
the maturity of these programs over time. Defining a streamlined, automated and standardized enterprise-wide identity
management program comes with its set of challenges such as
Timely
Protecting Balancing
Design of effective implementation of
Adopting a sensitive data and investments in
control mechanism Identity
business maximizing the these systems
supported by Management
oriented efficiency of while improving
sufficient reporting solutions to adhere
approach critical business operational
and documentation to compliance
processes efficiency
requirements
Tackling these challenges requires clear understanding of the business as well as the complex IT environment characteristic
of global enterprises. The first key to success is recognizing that identity management is a process and not technology or a
software product. HCL’s significant understanding of both business as well as technology makes it an ideal partner to help
create business-relevant road maps and solutions to address an enterprises’ identity and access management needs. Our
IAM practice has developed methodologies for helping enterprises comply with rigorous compliance deadlines without
compromising efforts implementing their strategic road map.
3. HCL Identity and
Access Management Services
Identity Access Privileged Identity
Management Management Identity Governance Authentication
Services Services Services Services Services
Integration/
Development Identity Web Privileged Role Multi Factor
Services Life Cycle Access Remote Engineering Authentication
Management Management Access and
Modeling
Directory
Services Enterprise Adaptive
Asset Single Privileged Authentication
Provisioning Sign On Session
Compliance, Management SoD
Auditing & Compliance
Reporting Web Single Out Of
Centralized Sign On Band
Role Privileged Authentication
Migration Management Single
Services and Federation Sign On Identity
Attestations Services Assurance
Authentication
Managed Brokerage
Services Role Based
Auditing and
Access Control
Work Flow Reporting
of Privileged Entitlement
Design and and
Architecture/ Sessions Managed
Implementation OS Access Access
Advisory Authentication
Services Control Certification Services
HCL’s IAM Practice covers Risk based Compliance Implementation, User Provisioning and Identity Administration,
Authentication Services, Password Management, Web and Enterprise Sign-on, Directory Services and Access Management,
Federated Identity Management, Strong Authentication and Risk Based Authentication, Segregation of Duties, Role Based
Access and Role Engineering, and Web Services Security.
4. Our Approach
Senior management and key stakeholders have a clear cut need to understand the long-term strategy for identity and access
management. IAM solutions can help transform the enterprise to a quickly changing enterprise if implemented properly.
Hence it is important to understand that to reduce failures in an IAM program, strategy and planned implementation plays a
major role. HCL’s IAM Practice has defined a well thought out delivery cycle for an IAM program as shown below:
Architecture Foundation Build Production Life cycle
Consulting
and design and testing Rollout support
IAM Consulting Services
Project Management and Quality
User Life Authentication
IAM Cycle Management Services Audit and
Solution Compliance
CoE’s Access & Entitlements Privileged User Reporting
Management Management
It’s clear that IAM projects require considerable planning and project management expertise, with a project team
representing various stakeholders within the company. Most notably, like virtually any large IT project, IAM requires strong
sponsorship from senior company management, who must understand the business benefits the technology can bring. And
everyone involved needs to understand that, to live up to their full potential, IAM solutions require regular care and feeding
long after the initial go-live date, which means planning for follow-up optimizations is crucial as well. HCL’s experienced
consultants use the structured approach to help the organization assess, design, implement, manage and monitor an
effective identity and access management program and drive key customer benefits like the following:
HCL IAM Key IAM Customer
Services Deliverables Benefits
Ÿ IAM Roadmap Ÿ Process Automation Ÿ Improved end-user
consulting Services and optimization experience
Ÿ IAM Implementation Ÿ Access Governance Ÿ Scalability and
Services Ÿ Audit and Compliance Integration
Ÿ Integration and reporting Ÿ Improved Operational
development services Ÿ Role Based Access efficiency
Ÿ Identity Migration Management Ÿ Reduced
services Ÿ Single Sign On and Administrative Costs
Ÿ Managed Identity Federation
Services
Ÿ Privileged Identity
Services
5. HCL Credentials and
Key Differentiators
Ÿ More than 25 customers worldwide have gained from HCL’s IAM expertise in various
HCL IAM stages of their IAM new and transformational projects
Ÿ Availability of more than 700+ pool of expertise having diversified understanding of
Services Security domain including consulting, implementation, development and operations
HCL IAM Ÿ Highly scalable labs for products, PoC’s , trainings and innovations
Ÿ Innovation-focused to support highly scalable solutions
CoE Ÿ Global partnership with key product vendors for offering joint solutions
Large pool
Ÿ Architects and security consultants with multiple project experience
of IDAM Ÿ Large development pool to address IDAM customizations and integrations
experts
Functional
Ÿ Increased Customer Satisfaction by 43% - CSAT Survey 2009
Delivery Ÿ Quadrupled the Number of Customers
Ÿ $5mn+ & $10mn+ Customers Grew by 4x
Excellence Ÿ $20mn+ Customers Grew by 5x
Model
Case in Discussion:
Asia’s largest Stock Exchange