SlideShare a Scribd company logo
MT 42 Ensuring the success of
your IAM project
What is your IAM
project?
“Superusers”Mobile users
Customer dataYour IP
IAM is critical… to protect people and things
Your systems
User access
But why?
Why do you want to protect these things?
• You have some really valuable stuff.
• Your users want what they want, when they want it, and it better be easy.
• Someone says you have to do it.
• Bad people are out there.
• Good people aren’t perfect.
• You don’t want to have a security breach.
It’s just the right thing to do.
So you engage in
an IAM project
(in one guise or another).
Top reasons we see IAM projects stall.
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
• A manual process for provisioning Active Directory with native tools
• A highly customized provisioning framework for the rest of the enterprise
• A purchased solution for authentication to federated applications
• A home-grown solution for authentication to internally-developed applications
• Another purchased solution for single sign-on to legacy applications
• A manual process for privileged password management
• A dedicated Active Directory bridge for some Unix/Linux privileged account
management tasks
• A self-service solution for resetting user passwords
Document management company
• IAM framework for provisioning
• Another solution for PAM
• Another for AD management
• Another for single sign-on
• Another for password management
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
An IAM framework that…
• Doesn’t do everything you need
• Maintains complexity
• Has made your org six years into the three-year IAM deployment
• Demands a constant stream of consultants and developers
• Has provided unfulfilled expectations
• When requirements change, it starts all over again
• “Traditional” IAM framework
• 16 full-time Java developers
• Two years in
• Provision 1 app (AD)
• Can’t de-provision anything
Fortune 100 company
Example failed use case:
• IAM gets run as one or more discreet IT projects
• Assuming just one technology will solve the problem
• Attempting to automate an existing process
• Assuming systems have boundaries
• Allowing scope to creep
• Trying to deliver everything at once
Sound familiar?
• How cumbersome are your “automated” processes?
• Are you actually provisioning everything you need?
• Who’s driving the bus, the business or IT?
• Governance: Attestation/re-certification
• Sun IAM framework
• Basic provisioning not up to par
• No access request
• No governance
• 3+ years to get to this point
Oil & gas company
All of them end with the same consequences…
• Inefficiency
• Audit exposure
• Inflexibility
• Cost overrun
Ultimately a project which
did not deliver as per the
expectations!
A recipe to make your
IAM project a success
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
Management
Control
Security
Access
Governance
Hierarchy of IAM needs
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Failed Novell and Oracle deployments
required three full-time staff just for
provisioning.
• Redirect staff to strategic IT initiatives.
• 18 weeks to value.
• Governance included.
Technology company
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Phase one deployment in 14 weeks
• Self-service access request
• Immediately automated 50% of
provisioning tasks
• Governance included
• Phase two underway
Oil & gas company
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Evolving environment (mergers)
required improvement over
manual provisioning processes
• Governance required including
data
• Reduced cost of compliance
• Drive identity from HR system
• Extend to students, staff, and
volunteers
Healthcare organization
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
What we know works
• Modular and integrated approach to
augment IAM framework
• AD management and extend to Unix
• Privileged account management
• Single sign-on and federation
• Self-service password reset
• Finally replace custom framework with
unified provisioning and governance.
Document management company
What we know works
• Know where you are.
• Get the basics right.
• Consider starting with provisioning.
• Involve the business; put the business in charge.
• Custom kills.
• Make it easy for users.
• Provision AD also provisions Unix
access
• Went from 12 Unix passwords to 1 AD
password
• Eliminated a $1M/month helpdesk bill
• Framework customization no longer
required for Unix IAM
Major bank
So, where can you
turn for help?
All of them end with the same consequences…
• Focus on what matters the most
to you and your organisation
• Include external systems where
possible
• Build the team of experts
Remember IAM is
about bringing
business agility as
well as managing risk!
Protect Comply Enable
security for better .
User – Identity and Access Management
Endpoint
(Data center – edge)
Network
(Perimeter and beyond)
Data and Application
(On-premises – cloud)
Managed Security Services Security Intelligence and Response
Strategically connect solutions to enable better outcomes
Better security for better business.
Why work with Dell
The path to
governance
• Policy-based
access control
• Governance for
identities, user
access, data and
elevated access
• Privileged
account
lockdown
Business driven
• User and line-of-
business self-
service
• Unified policy,
identity and
workflow
• Complete
visibility and
control
Future-ready
• Configure, don’t
code
• Adapt to meet
changing
organizational
needs
• Minimize the shock
of constantly
changing
employee roles
Modular and
integrated
• Doesn’t demand
a rigid framework
• Start anywhere
and build from
there
• Easily plugs into
existing tools and
solutions
Rapid time to
value
• Deploy initial
functionality
quickly
• Streamline and
automate tasks
• Meet existing
business
processes
Thanks!
Jackson.shaw@software.dell.com
eBook: Future-ready IAM at http://dell.to/1JHdVOE
software.dell.com/IAM

More Related Content

What's hot (20)

Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice Corporation
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
Ivanti
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
Softchoice Corporation
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
Dell EMC World
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
Martin Pietrzak
 
DevOps Transformation Approach - Addteq
DevOps Transformation Approach - AddteqDevOps Transformation Approach - Addteq
DevOps Transformation Approach - Addteq
Addteq
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?
Avtex
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
Ghassan Chahine
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
Ivanti
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
SVAM International, Inc.
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
RES
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??
TechSoup
 
Beka Technology
Beka TechnologyBeka Technology
Beka Technology
shyammohanc
 
Cloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integratorsCloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integrators
Liubov Belousova
 
Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to Know
TechSoup
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
MarcoTechnologies
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Cisco Canada
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice Corporation
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
Ivanti
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
Dell EMC World
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
Martin Pietrzak
 
DevOps Transformation Approach - Addteq
DevOps Transformation Approach - AddteqDevOps Transformation Approach - Addteq
DevOps Transformation Approach - Addteq
Addteq
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?
Avtex
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
Ghassan Chahine
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
Ivanti
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
RES
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??
TechSoup
 
Cloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integratorsCloud Program for resellers, ISP, integrators
Cloud Program for resellers, ISP, integrators
Liubov Belousova
 
Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to Know
TechSoup
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
MarcoTechnologies
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Cisco Canada
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
 

Viewers also liked (20)

User Manager
User ManagerUser Manager
User Manager
EmpowerID
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
Dell World
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
Mario Cardinal
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
Network Intelligence India
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
Dell World
 
MarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographicMarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographic
Sandy Halse DipM ACIM
 
Www.rabattakku.com acer.html
Www.rabattakku.com acer.htmlWww.rabattakku.com acer.html
Www.rabattakku.com acer.html
restorationsder
 
Storage user cases
Storage user casesStorage user cases
Storage user cases
Andrea Mauro
 
Business Continuity & Storage
Business Continuity & StorageBusiness Continuity & Storage
Business Continuity & Storage
Andrea Mauro
 
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel PartnersDell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell World
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
WSO2
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
Dell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
Dell World
 
Dell vision and solutions
Dell vision and solutionsDell vision and solutions
Dell vision and solutions
Andrea Mauro
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
Prabath Siriwardena
 
The dell model
The dell modelThe dell model
The dell model
Ashraf Hlouh
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
Drew Koenig
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
dreamforce2006
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
Dell World
 
Salesforce Partner Program
Salesforce Partner ProgramSalesforce Partner Program
Salesforce Partner Program
Salesforce Partners
 
User Manager
User ManagerUser Manager
User Manager
EmpowerID
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
Dell World
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
Mario Cardinal
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
Dell World
 
MarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographicMarketingConnex channel & partner marketing infographic
MarketingConnex channel & partner marketing infographic
Sandy Halse DipM ACIM
 
Www.rabattakku.com acer.html
Www.rabattakku.com acer.htmlWww.rabattakku.com acer.html
Www.rabattakku.com acer.html
restorationsder
 
Storage user cases
Storage user casesStorage user cases
Storage user cases
Andrea Mauro
 
Business Continuity & Storage
Business Continuity & StorageBusiness Continuity & Storage
Business Continuity & Storage
Andrea Mauro
 
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel PartnersDell Enterprise Blueprints and Solutions for Channel Partners
Dell Enterprise Blueprints and Solutions for Channel Partners
Dell World
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
WSO2
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
Dell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
Dell World
 
Dell vision and solutions
Dell vision and solutionsDell vision and solutions
Dell vision and solutions
Andrea Mauro
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
dreamforce2006
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
Dell World
 

Similar to The Keys To A Successful Identity And Access Management Program: How Does Your Approach Compare To Industry Best Practices? (20)

cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
dominion
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
LINE Corporation
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
AppDynamics
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
Quest
 
Oracle IAM |Tangenz Corporation
Oracle IAM |Tangenz CorporationOracle IAM |Tangenz Corporation
Oracle IAM |Tangenz Corporation
AliceJonson
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
eG Innovations
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
John D. Johnson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
ServiceRocket
 
Neuranet.pptx
Neuranet.pptxNeuranet.pptx
Neuranet.pptx
Rohit Kapoor
 
Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdles
Scalr
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
Samuel Reed
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
Infrastructure for SaaS Applications
Infrastructure for SaaS ApplicationsInfrastructure for SaaS Applications
Infrastructure for SaaS Applications
Ejaz Siddiqui
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
Aldo Pietropaolo
 
IBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor PerryIBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor Perry
Fresche Solutions
 
Jason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdfJason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdf
AWS Chicago
 
Seamless erp
Seamless erpSeamless erp
Seamless erp
Som Imaging Informatics Pvt. Ltd
 
Iamlug presentation without embedded video
Iamlug presentation without embedded videoIamlug presentation without embedded video
Iamlug presentation without embedded video
Scotttomlinson
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
dominion
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
LINE Corporation
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
AppDynamics
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
Quest
 
Oracle IAM |Tangenz Corporation
Oracle IAM |Tangenz CorporationOracle IAM |Tangenz Corporation
Oracle IAM |Tangenz Corporation
AliceJonson
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
eG Innovations
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
John D. Johnson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
ServiceRocket
 
Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdles
Scalr
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
Samuel Reed
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
Infrastructure for SaaS Applications
Infrastructure for SaaS ApplicationsInfrastructure for SaaS Applications
Infrastructure for SaaS Applications
Ejaz Siddiqui
 
IBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor PerryIBM i and Your IT Strategy - Trevor Perry
IBM i and Your IT Strategy - Trevor Perry
Fresche Solutions
 
Jason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdfJason Nelson_Rapid AWS Service Enablement.pdf
Jason Nelson_Rapid AWS Service Enablement.pdf
AWS Chicago
 
Iamlug presentation without embedded video
Iamlug presentation without embedded videoIamlug presentation without embedded video
Iamlug presentation without embedded video
Scotttomlinson
 

More from Dell World (20)

Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
Dell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
Dell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
Dell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
Dell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
Dell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
Dell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
Dell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
Dell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Dell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
Dell World
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Dell World
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Dell World
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
Dell World
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
Dell World
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?
Dell World
 
Channel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutionsChannel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutions
Dell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
Dell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
Dell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
Dell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
Dell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
Dell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
Dell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
Dell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
Dell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Dell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
Dell World
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Dell World
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Dell World
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
Dell World
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
Dell World
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?
Dell World
 
Channel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutionsChannel partners: Get ready for future trends in client solutions
Channel partners: Get ready for future trends in client solutions
Dell World
 

Recently uploaded (20)

Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 

The Keys To A Successful Identity And Access Management Program: How Does Your Approach Compare To Industry Best Practices?

  • 1. MT 42 Ensuring the success of your IAM project
  • 2. What is your IAM project?
  • 3. “Superusers”Mobile users Customer dataYour IP IAM is critical… to protect people and things Your systems User access
  • 5. Why do you want to protect these things? • You have some really valuable stuff. • Your users want what they want, when they want it, and it better be easy. • Someone says you have to do it. • Bad people are out there. • Good people aren’t perfect. • You don’t want to have a security breach. It’s just the right thing to do.
  • 6. So you engage in an IAM project (in one guise or another).
  • 7. Top reasons we see IAM projects stall. • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 8. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 9. Sound familiar? • A manual process for provisioning Active Directory with native tools • A highly customized provisioning framework for the rest of the enterprise • A purchased solution for authentication to federated applications • A home-grown solution for authentication to internally-developed applications • Another purchased solution for single sign-on to legacy applications • A manual process for privileged password management • A dedicated Active Directory bridge for some Unix/Linux privileged account management tasks • A self-service solution for resetting user passwords
  • 10. Document management company • IAM framework for provisioning • Another solution for PAM • Another for AD management • Another for single sign-on • Another for password management
  • 11. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 12. Sound familiar? An IAM framework that… • Doesn’t do everything you need • Maintains complexity • Has made your org six years into the three-year IAM deployment • Demands a constant stream of consultants and developers • Has provided unfulfilled expectations • When requirements change, it starts all over again
  • 13. • “Traditional” IAM framework • 16 full-time Java developers • Two years in • Provision 1 app (AD) • Can’t de-provision anything Fortune 100 company
  • 14. Example failed use case: • IAM gets run as one or more discreet IT projects • Assuming just one technology will solve the problem • Attempting to automate an existing process • Assuming systems have boundaries • Allowing scope to creep • Trying to deliver everything at once
  • 15. Sound familiar? • How cumbersome are your “automated” processes? • Are you actually provisioning everything you need? • Who’s driving the bus, the business or IT? • Governance: Attestation/re-certification
  • 16. • Sun IAM framework • Basic provisioning not up to par • No access request • No governance • 3+ years to get to this point Oil & gas company
  • 17. All of them end with the same consequences… • Inefficiency • Audit exposure • Inflexibility • Cost overrun Ultimately a project which did not deliver as per the expectations!
  • 18. A recipe to make your IAM project a success
  • 19. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 20. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 22. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 23. • Failed Novell and Oracle deployments required three full-time staff just for provisioning. • Redirect staff to strategic IT initiatives. • 18 weeks to value. • Governance included. Technology company
  • 24. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 25. • Phase one deployment in 14 weeks • Self-service access request • Immediately automated 50% of provisioning tasks • Governance included • Phase two underway Oil & gas company
  • 26. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 27. • Evolving environment (mergers) required improvement over manual provisioning processes • Governance required including data • Reduced cost of compliance • Drive identity from HR system • Extend to students, staff, and volunteers Healthcare organization
  • 28. • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users. What we know works
  • 29. • Modular and integrated approach to augment IAM framework • AD management and extend to Unix • Privileged account management • Single sign-on and federation • Self-service password reset • Finally replace custom framework with unified provisioning and governance. Document management company
  • 30. What we know works • Know where you are. • Get the basics right. • Consider starting with provisioning. • Involve the business; put the business in charge. • Custom kills. • Make it easy for users.
  • 31. • Provision AD also provisions Unix access • Went from 12 Unix passwords to 1 AD password • Eliminated a $1M/month helpdesk bill • Framework customization no longer required for Unix IAM Major bank
  • 32. So, where can you turn for help?
  • 33. All of them end with the same consequences… • Focus on what matters the most to you and your organisation • Include external systems where possible • Build the team of experts Remember IAM is about bringing business agility as well as managing risk!
  • 34. Protect Comply Enable security for better . User – Identity and Access Management Endpoint (Data center – edge) Network (Perimeter and beyond) Data and Application (On-premises – cloud) Managed Security Services Security Intelligence and Response Strategically connect solutions to enable better outcomes Better security for better business.
  • 35. Why work with Dell The path to governance • Policy-based access control • Governance for identities, user access, data and elevated access • Privileged account lockdown Business driven • User and line-of- business self- service • Unified policy, identity and workflow • Complete visibility and control Future-ready • Configure, don’t code • Adapt to meet changing organizational needs • Minimize the shock of constantly changing employee roles Modular and integrated • Doesn’t demand a rigid framework • Start anywhere and build from there • Easily plugs into existing tools and solutions Rapid time to value • Deploy initial functionality quickly • Streamline and automate tasks • Meet existing business processes
  • 36. Thanks! [email protected] eBook: Future-ready IAM at http://dell.to/1JHdVOE software.dell.com/IAM