SlideShare una empresa de Scribd logo
1 de 10
Automated Security
Entitlement System
Traditional access management
• Challenge:
• permission
management for
shared resources
across corporate
networks.
• Sources of data:
• Shared network drives
• Mainframes
• Cloud
• DB2
Individualapplicationsfor eachdata source
• Problems include:
• Time wasted through
repetitive data entry
• Non-standardized
permissions between
employees in same role.
• Slow, inefficient, manual
rights administration
• Locally stored forms often
outdated and inaccurate
Productivity impacts
• For each employee,
obtaining complete
access to all
necessary shared
resources can take up
to one month.
• Lost productivity
compounds over
number of new
employees per
month.
Audit trail
• Each individual access
application has multiple
approvers.
• Approval details often
stored on local
spreadsheets or in email,
making audits difficult,
slow and expensive.
Rights rescission
• Manual rights
administration
combined with audit
trail challenges =
delays in removing
rights upon
employee
termination or role
change.
• Unauthorized access
= liability.
Solution:
AutomatedSecurity EntitlementSystem
• Characteristics:
• Single, centralized database housing
current versions of all forms.
• Single website linking to forms organized
by employee title.
• Automatic emails sent to approvers with
bundled applications.
• Streamlined approval or rescission
process.
• Connectors automatically push approvals
or rescissions to data sources.
• Approvals or rescissions stored in database
for audit trail.
Solution:
AutomatedSecurity EntitlementSystem
• Off-The-Shelf Solutions:
• Oracle Identity Manager Solution
• CA Identity Manager
• NetIQ Governance Suite
• SRI Custom Built Solutions:
• Top to bottom identity management systems
• Proprietary connectors to connect to Teradata,
Trivoli & Hadoop
Solution:
AutomatedSecurity EntitlementSystem
• Benefits
• Centralized, official location for all forms
= up to date permissions
• Forms bundled via job role = uniform
rights across enterprise.
• Employee information obtained from
Microsoft Single Sign On = efficiency.
• Single application sent to approvers =
efficiency.
• Approvals & rescissions completed with
one click = improved risk management.
• Approvals stored in central database =
easier audit compliance & completion.
Questions?

Más contenido relacionado

La actualidad más candente

Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
Steve Crawford
 
Sateesh DCTM 5+ Years
Sateesh DCTM 5+ YearsSateesh DCTM 5+ Years
Sateesh DCTM 5+ Years
satish kumar
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
Webx
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
Saravanan Purushothaman
 

La actualidad más candente (19)

Windows 7 Make People Productive Anywhere
Windows 7 Make People Productive AnywhereWindows 7 Make People Productive Anywhere
Windows 7 Make People Productive Anywhere
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
HP OM
HP OMHP OM
HP OM
 
SyedAhmed
SyedAhmedSyedAhmed
SyedAhmed
 
Mirroring and replications
Mirroring and replicationsMirroring and replications
Mirroring and replications
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 
AppSense Product Deck
AppSense Product DeckAppSense Product Deck
AppSense Product Deck
 
Architecture patterns overview
Architecture patterns overviewArchitecture patterns overview
Architecture patterns overview
 
VMware View - Marek Bražina
VMware View - Marek BražinaVMware View - Marek Bražina
VMware View - Marek Bražina
 
User Virtualization with AppSense
User Virtualization with AppSenseUser Virtualization with AppSense
User Virtualization with AppSense
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
 
Sateesh DCTM 5+ Years
Sateesh DCTM 5+ YearsSateesh DCTM 5+ Years
Sateesh DCTM 5+ Years
 
Chapter04 automated tools for systems development
Chapter04 automated tools for systems developmentChapter04 automated tools for systems development
Chapter04 automated tools for systems development
 
Livebase: a database for the web 2.0
Livebase: a database for the web 2.0Livebase: a database for the web 2.0
Livebase: a database for the web 2.0
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 

Destacado

Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
David Brossard
 
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Technology
 

Destacado (7)

Automated Securities Accounting System
Automated Securities Accounting System Automated Securities Accounting System
Automated Securities Accounting System
 
Cloud Migration Projects & Capabilities
Cloud Migration Projects & CapabilitiesCloud Migration Projects & Capabilities
Cloud Migration Projects & Capabilities
 
WebRTC: Efficiency, Loyalty & Flexibility
WebRTC: Efficiency, Loyalty & FlexibilityWebRTC: Efficiency, Loyalty & Flexibility
WebRTC: Efficiency, Loyalty & Flexibility
 
Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
 
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
Publishing Perspectives Backlist 2014 Randy Petway Publishing Technology Case...
 
2014 Mobile Reading Research
2014 Mobile Reading Research 2014 Mobile Reading Research
2014 Mobile Reading Research
 

Similar a IDM and Automated Security Entitlement Systems

Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeksSynergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis Engineering Design Solutions
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
jemtallon
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
Mentalist Akram
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
Sectricity
 
Planning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPMPlanning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPM
WASdev Community
 

Similar a IDM and Automated Security Entitlement Systems (20)

Fishbowl's Packaged Tools for WebCenter Automation
Fishbowl's Packaged Tools for WebCenter AutomationFishbowl's Packaged Tools for WebCenter Automation
Fishbowl's Packaged Tools for WebCenter Automation
 
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeksSynergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
Synergis University 2014- 10 Data Management Challenges You Can Solve in 3 weeks
 
sequel for biginners.pptx
sequel for biginners.pptxsequel for biginners.pptx
sequel for biginners.pptx
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Threats
ThreatsThreats
Threats
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
dbms ppt.pptx database management system
dbms ppt.pptx database management systemdbms ppt.pptx database management system
dbms ppt.pptx database management system
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
PPT
PPTPPT
PPT
 
Planning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPMPlanning For Catastrophe with IBM WAS and IBM BPM
Planning For Catastrophe with IBM WAS and IBM BPM
 
142 wendy shank
142 wendy shank142 wendy shank
142 wendy shank
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)
 
Data Vault Automation at the Bijenkorf
Data Vault Automation at the BijenkorfData Vault Automation at the Bijenkorf
Data Vault Automation at the Bijenkorf
 
Distributed data processing
Distributed data processingDistributed data processing
Distributed data processing
 
Unit 2 oracle9i
Unit 2  oracle9i Unit 2  oracle9i
Unit 2 oracle9i
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

IDM and Automated Security Entitlement Systems

  • 2. Traditional access management • Challenge: • permission management for shared resources across corporate networks. • Sources of data: • Shared network drives • Mainframes • Cloud • DB2
  • 3. Individualapplicationsfor eachdata source • Problems include: • Time wasted through repetitive data entry • Non-standardized permissions between employees in same role. • Slow, inefficient, manual rights administration • Locally stored forms often outdated and inaccurate
  • 4. Productivity impacts • For each employee, obtaining complete access to all necessary shared resources can take up to one month. • Lost productivity compounds over number of new employees per month.
  • 5. Audit trail • Each individual access application has multiple approvers. • Approval details often stored on local spreadsheets or in email, making audits difficult, slow and expensive.
  • 6. Rights rescission • Manual rights administration combined with audit trail challenges = delays in removing rights upon employee termination or role change. • Unauthorized access = liability.
  • 7. Solution: AutomatedSecurity EntitlementSystem • Characteristics: • Single, centralized database housing current versions of all forms. • Single website linking to forms organized by employee title. • Automatic emails sent to approvers with bundled applications. • Streamlined approval or rescission process. • Connectors automatically push approvals or rescissions to data sources. • Approvals or rescissions stored in database for audit trail.
  • 8. Solution: AutomatedSecurity EntitlementSystem • Off-The-Shelf Solutions: • Oracle Identity Manager Solution • CA Identity Manager • NetIQ Governance Suite • SRI Custom Built Solutions: • Top to bottom identity management systems • Proprietary connectors to connect to Teradata, Trivoli & Hadoop
  • 9. Solution: AutomatedSecurity EntitlementSystem • Benefits • Centralized, official location for all forms = up to date permissions • Forms bundled via job role = uniform rights across enterprise. • Employee information obtained from Microsoft Single Sign On = efficiency. • Single application sent to approvers = efficiency. • Approvals & rescissions completed with one click = improved risk management. • Approvals stored in central database = easier audit compliance & completion.