SlideShare a Scribd company logo
1 of 13
Download to read offline
1 ID Management Suite



                                                          Managing the User Lifecycle
                                                          Across On-Premises and
                                                          Cloud-Hosted Applications




Fully integrated identity and access management.




2 Agenda
  •   Introductions.
  •   Hitachi ID corporate overview.
  •   ID Management Suite overview.
  •   The user management lifecycle.
  •   Addressing identity management system deployment challenges.
  •   Advantages of the Hitachi ID solution.




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.   1
Slide Presentation




3 Hitachi ID Corporate Overview


   Hitachi ID is a leading provider of identity
   and access management solutions.
       • Founded as M-Tech in 1992.
       • A division of Hitachi, Ltd. since 2008.
       • Over 900 customers.
       • More than 11M+ licensed users.
       • Offices in North America, Europe and
         APAC.
       • Partners globally.




4 Representative Hitachi ID Customers




                                                  © 2012 Hitachi ID Systems, Inc.. All rights reserved.       2
Slide Presentation




5 The User Lifecycle
  At a high level, the user
  lifecycle is essentially
  the same in all
  organizations and
  across all platforms.




6 Business Challenges
                                                  Slow:                                                   Role changes:
     • More IT → more                    too much paper,                                                  add/remove rights.
                                        too many people.
       users to manage.                      Expensive:
                                                                                                          Policies:
                                                                                                          enforced?
     • There are                 too many administrators                                                  Audit:
                                   doing redundant work.                                                  are privileges appropriate?
       challenges                                                                                         Org. relationships:
       throughout the                                                                                     track and maintain.

       user lifecycle.
     • Support cost.
     • User service.
     • Security.                                 Reliable:                                                Passwords:
                              notification of terminations.                                                too many, too weak,
                                                  Fast:                                                   often forgotten.
                                 response by sysadmins.                                                   Access:
                                              Complete:                                                   Why can’t I access that
                                   deactivation of all IDs.                                               application / folder / etc.




                                                              © 2012 Hitachi ID Systems, Inc.. All rights reserved.                     3
Slide Presentation




7 IAM in Silos
In most organizations, many processes affect many applications.
This many-to-many relationship creates complexity:




8 Distributed IAM Is Complex
  • Managing each system and application separately is complex.
  • Complexity is bad:
      – Expensive: redundant updates to every system when hiring, moving or terminating users.
      – Unfriendly: users have lots of different IDs and passwords, which they don’t know how to
        manage.
      – Insecure: mistakes are made and users get or retain excess entitlements.
        Orphan and dormant accounts.
        Stale privileges.
  • Every system and application added makes things worse.




                                             © 2012 Hitachi ID Systems, Inc.. All rights reserved.       4
Slide Presentation




9 Integrated IAM Processes
 Business Processes                                                                                   IT Processes


   Hire          Retire          Resign      Finish Contract                    New Application     Retire Application



      Transfer            Fire      Start Contract                              Password Expiry     Password Reset




                                           Identity Management System




                                                                                                               Users
                                                                                                          Passwords
 Operating   Directory       Application    Database    E-mail         ERP        Legacy      Mainframe        Groups
  System                                                System                     App
                                                                                                          Attributes
 Systems and Applications




10 ID Management Suite




                                                       © 2012 Hitachi ID Systems, Inc.. All rights reserved.             5
Slide Presentation




11 Onboarding New Users
                                  Hitachi ID Identity Manager can accelerate the
                                  onboarding process and reduce the security
                                  administration burden:
                                      • Automation:
                                        Detect new hires in HR and automatically
                                        create access on managed systems,
                                        such as AD, SAP and the mainframe.
                                      • Self-service workflow:
                                        Managers can request and approve
                                        access electronically, for example for
                                        contractors.
                                      • Consolidated administration:
                                        Security administrators save time by
                                        using one tool to manage users across
                                        every system.




12 Change Management


                                   Hitachi ID Identity Manager manages
                                   changes to user profiles:
                                       • Self-service updates to phone
                                         numbers, department codes, etc.


                                   HiIM, Hitachi ID Group Manager and Hitachi
                                   ID Org Manager manage changes to user
                                   roles and responsibilities:
                                       • Self-service requests for new
                                         entitlements.
                                       • Distributed audit of user rights by
                                         managers and app owners.
                                       • Distributed update of organizational
                                         relationships by managers.




                          © 2012 Hitachi ID Systems, Inc.. All rights reserved.       6
Slide Presentation




13 IT Support


                          Hitachi ID Password Manager for "I
                          forgot/locked my password" calls:
                              • Synchronization: Users with fewer
                                passwords have fewer problems.
                              • Reset: Users can resolve their own
                                problems without calling the help desk.
                              • Assistance: A help desk interface
                                reduces the duration and cost of
                                remaining calls.


                          Hitachi ID Group Manager for "access
                          denied" calls:
                              • Self-service: Users browse for
                                resources and request access.
                              • Authorization workflow: Group
                                owners are asked to review and
                                approve change requests.




                © 2012 Hitachi ID Systems, Inc.. All rights reserved.       7
Slide Presentation




14 Deactivating Access


                                    Retirement, resignation, end-of-contract:
                                        • Hitachi ID Identity Manager detects
                                          changes in systems of record, such
                                          as HR, and deactivates all access.
                                        • Managers can schedule deactivation
                                          with a workflow form.


                                    Dismissals:
                                        • Security administrators use an HiIM
                                          form to terminate all of a user’s
                                          accounts immediately.


                                    Asset retrieval
                                        • HiIM inventory tracking assists in
                                          retrieval of PCs, cell phones, building
                                          access badges, etc.




                         © 2012 Hitachi ID Systems, Inc.. All rights reserved.       8
Slide Presentation




15 Closed Loop IAM

Integrated                                Hitachi ID Management Suite                                                     Integrated
  Systems                                                      List accounts                                              Target
                    List
 of Record          people             Auto                                                                               Systems
                                    discovery
                                                               Updates
                              Detected
                              changes
                                                                                                            Create,                    Non-integrated
                                Auto-provisioning                   Identity                                delete,                    Systems
                                 Identity synch.                     Cache                                  update
                                                                                       Updates            accounts
                              Automatic
                              request
                                                    - Validate requests
                                                                               Auto-
                   Manual        Requests           - Route for approval
  Requesters                      Web UI            - Invite authorizers
                                                                               fulfillment
                   request
                                                    - Send reminders                                            Work
                                                    - Escalate                                                  Queue
                Invitations                         - Delegate                                                                  Create,
                                                                                Manual                                          delete,
                                                                                fulfillment   Connectors                         update
                                                                Request                                    Transaction          accounts
                                Approvals                        Queue
  Authorizers     Approve,
                                 Web UI
                                                                                                             Manager
                  reject,
                  delegate

                Invitations                                                                         Invitations



                               Certification                   Workflow            Implementer      Accept,
   Certifiers      Review,
                                                                                                                        Implementers
                   certify,      Web UI                        Manager               Web UI         confirm
                   correct




                                                               © 2012 Hitachi ID Systems, Inc.. All rights reserved.                              9
Slide Presentation




16 Multi-Master Architecture

                                                                  ix,
                                                                Un ,
                                                              D, /390
                                                             A S P,
                                                           d   O DA 0
                                                       e
                                                    tiv or       L S40                                                          d,
                                                  Na assw ge       A                                                        st e
                                                    p han             Password
                                                                                                                         -ho pps
                         User                          c
                                                                      Synch                                           ud a
                                                                      Trigger            Target Systems            Clo aaS
                                                                      Systems
                                                                                                                     S
                                                                                         with local agent:
                                                                                         OS/390, Unix,
                                                             PW
                   Reverse                             ate        Hitachi ID             older RSA
                                                   lid
                   Web Proxy                     Va               Application
          VPN                                                                                s               Target Systems
                                                                  Server(s)               ice
          Server                                                                       erv                   with remote agent:
 IVR                                                                                 bS
                                                                        SQL
 Server                                                                 DB
                                                                                   We                        AD, SQL, SAP, Notes, etc

                                                                                                             ork
                                      Load
                                                         SQL

                                                                                                          etw
                                      Balancer           DB

                                                                                                        lN
                                                                                                   ca
                                          ails                                                   Lo
                                                                                                                                     Target Systems
                                        Em                        SQL/Oracle
                                                                                                                                         ter
                                                                                                                                       en
                                                                                      Firewall
                               SMTP or
                                                              ets
                               Notes Mail        Tic
                                                     k
                                                                          ge
                                                                            r
                                                                                                                                   t aC
                                                                   &T
                                                                     r ig
                                                                                                                                Da
                                        Incident
                                                                up                                                         te
  TCP/IP + AES                          Management         Lo
                                                              ok
                                                                                                                         mo
  Various Protocols
                                        System     System of                        Firewall                        Re
                                                             Record                              Proxy Server
  Secure Native Protocol
                                                                                                 (if needed)
  HTTPS




                                                                       © 2012 Hitachi ID Systems, Inc.. All rights reserved.                          10
Slide Presentation




17 Included Connectors
Many integrations to target systems included in the base price:



    Directories:                     Servers:                            Databases:
    Any LDAP, AD, WinNT, NDS,        Windows NT, 2000, 2003,             Oracle, Sybase, SQL Server,
    eDirectory, NIS/NIS+.            2008, Samba, Novell,                DB2/UDB, Informix, ODBC.
                                     SharePoint.
    Unix:                            Mainframes, Midrange:               HDD Encryption:
    Linux, Solaris, AIX, HPUX, 24    z/OS: RACF, ACF2,                   McAfee, CheckPoint.
    more.                            TopSecret. iSeries,
                                     OpenVMS.
    ERP:                             Collaboration:                      Tokens, Smart Cards:
    JDE, Oracle eBiz, PeopleSoft,    Lotus Notes, Exchange,              RSA SecurID, SafeWord,
    SAP R/3 and ECC 6, Siebel,       GroupWise, BlackBerry ES.           RADIUS, ActivIdentity,
    Business Objects.                                                    Schlumberger.
    WebSSO:                          Help Desk:                          Cloud/SaaS:
    CA Siteminder, IBM TAM,          BMC Remedy, SDE, HP SM,             WebEx, Google Apps,
    Oracle AM, RSA Access            CA Unicenter, Assyst, HEAT,         Salesforce.com, SOAP
    Manager.                         Altiris, Track-It!                  (generic).




18 Simple Integration with Custom Apps
  • ID Management Suite easily integrates with custom, vertical and hosted applications using flexible
    agents .
  • Each flexible agent connects to a class of applications:
      –   API bindings (C, C++, Java, COM, ActiveX, MQ Series).
      –   Telnet / TN3270 / TN5250 / sessions with TLS or SSL.
      –   SSH sessions.
      –   HTTP(S) administrative interfaces.
      –   Web services.
      –   Win32 and Unix command-line administration programs.
      –   SQL scripts.
      –   Custom LDAP attributes.
  • Integration takes a few hours to a few days.
  • Fixed cost service available from Hitachi ID.




                                              © 2012 Hitachi ID Systems, Inc.. All rights reserved.        11
Slide Presentation




19 IAM Project Risk Management

  IAM projects often take too long and cost too        Risk management
  much. Why?
      • Data quality:                                        • Combine automation and self-service for
                                                               clean up.

           – Nonstandard, disconnected IDs
           – Incorrect, old identity data.

      • Never-ending role engineering:                       • Start deployment with just a few roles.
                                                             • Add roles gradually, based on demand.

           – Role based access control is a good
             objective, but...
           – It can be slow and costly to develop
             and maintain roles.
           – Some users just don’t fit.

      • Too many workflows:                                   • Implement a generic change
                                                               management system.
                                                             • Custom forms for just the most popular
           – Defining too many forms, processes                 requests.
             takes too long.
           – One form, one process per change
             type? Per system?




20 Hitachi ID Technology Advantages
  • More features and functionality for less money:
      – Lower initial and ongoing investment (License scheme)
      – Lower on-going administration costs
  • Technology (not services) drives down deployment costs:

      –   Auto-discovery.
      –   Self-service login ID reconciliation.
      –   More pre-built connectors.
      –   Support for multi-tenant installation.
      –   Functional across customer firewalls.
      –   Avoids role engineering.
      –   Dynamic workflow.
      –   Full functionality without client software.
      –   Easier to extend to custom applications/targets.


                                              © 2012 Hitachi ID Systems, Inc.. All rights reserved.        12
Slide Presentation




               21 ID Management Suite Summary
                    • A rich suite of identity and access management products, with over 11M licensed users, that can:
                         –   Discover and connect user objects from every system.
                         –   Streamline administration of users, entitlements and login credentials.
                         –   Construct and maintain OrgChart data.
                         –   Secure access to privileged accounts on thousands of systems.
                    • Lock down security and comply with regulations requiring internal controls.
                    • Reduce operating costs and improve user productivity.
                    • Flexible, scalable, reliable, available.




500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com


                                                                                              File: PRCS:pres
www.Hitachi-ID.com                                                                            Date: March 1, 2012

More Related Content

More from Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (20)

Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Streamlining user lifecycle management with Hitachi ID Management Suite

  • 1. 1 ID Management Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Fully integrated identity and access management. 2 Agenda • Introductions. • Hitachi ID corporate overview. • ID Management Suite overview. • The user management lifecycle. • Addressing identity management system deployment challenges. • Advantages of the Hitachi ID solution. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 2. Slide Presentation 3 Hitachi ID Corporate Overview Hitachi ID is a leading provider of identity and access management solutions. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 900 customers. • More than 11M+ licensed users. • Offices in North America, Europe and APAC. • Partners globally. 4 Representative Hitachi ID Customers © 2012 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 3. Slide Presentation 5 The User Lifecycle At a high level, the user lifecycle is essentially the same in all organizations and across all platforms. 6 Business Challenges Slow: Role changes: • More IT → more too much paper, add/remove rights. too many people. users to manage. Expensive: Policies: enforced? • There are too many administrators Audit: doing redundant work. are privileges appropriate? challenges Org. relationships: throughout the track and maintain. user lifecycle. • Support cost. • User service. • Security. Reliable: Passwords: notification of terminations. too many, too weak, Fast: often forgotten. response by sysadmins. Access: Complete: Why can’t I access that deactivation of all IDs. application / folder / etc. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 4. Slide Presentation 7 IAM in Silos In most organizations, many processes affect many applications. This many-to-many relationship creates complexity: 8 Distributed IAM Is Complex • Managing each system and application separately is complex. • Complexity is bad: – Expensive: redundant updates to every system when hiring, moving or terminating users. – Unfriendly: users have lots of different IDs and passwords, which they don’t know how to manage. – Insecure: mistakes are made and users get or retain excess entitlements. Orphan and dormant accounts. Stale privileges. • Every system and application added makes things worse. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 5. Slide Presentation 9 Integrated IAM Processes Business Processes IT Processes Hire Retire Resign Finish Contract New Application Retire Application Transfer Fire Start Contract Password Expiry Password Reset Identity Management System Users Passwords Operating Directory Application Database E-mail ERP Legacy Mainframe Groups System System App Attributes Systems and Applications 10 ID Management Suite © 2012 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 6. Slide Presentation 11 Onboarding New Users Hitachi ID Identity Manager can accelerate the onboarding process and reduce the security administration burden: • Automation: Detect new hires in HR and automatically create access on managed systems, such as AD, SAP and the mainframe. • Self-service workflow: Managers can request and approve access electronically, for example for contractors. • Consolidated administration: Security administrators save time by using one tool to manage users across every system. 12 Change Management Hitachi ID Identity Manager manages changes to user profiles: • Self-service updates to phone numbers, department codes, etc. HiIM, Hitachi ID Group Manager and Hitachi ID Org Manager manage changes to user roles and responsibilities: • Self-service requests for new entitlements. • Distributed audit of user rights by managers and app owners. • Distributed update of organizational relationships by managers. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 7. Slide Presentation 13 IT Support Hitachi ID Password Manager for "I forgot/locked my password" calls: • Synchronization: Users with fewer passwords have fewer problems. • Reset: Users can resolve their own problems without calling the help desk. • Assistance: A help desk interface reduces the duration and cost of remaining calls. Hitachi ID Group Manager for "access denied" calls: • Self-service: Users browse for resources and request access. • Authorization workflow: Group owners are asked to review and approve change requests. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 7
  • 8. Slide Presentation 14 Deactivating Access Retirement, resignation, end-of-contract: • Hitachi ID Identity Manager detects changes in systems of record, such as HR, and deactivates all access. • Managers can schedule deactivation with a workflow form. Dismissals: • Security administrators use an HiIM form to terminate all of a user’s accounts immediately. Asset retrieval • HiIM inventory tracking assists in retrieval of PCs, cell phones, building access badges, etc. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 8
  • 9. Slide Presentation 15 Closed Loop IAM Integrated Hitachi ID Management Suite Integrated Systems List accounts Target List of Record people Auto Systems discovery Updates Detected changes Create, Non-integrated Auto-provisioning Identity delete, Systems Identity synch. Cache update Updates accounts Automatic request - Validate requests Auto- Manual Requests - Route for approval Requesters Web UI - Invite authorizers fulfillment request - Send reminders Work - Escalate Queue Invitations - Delegate Create, Manual delete, fulfillment Connectors update Request Transaction accounts Approvals Queue Authorizers Approve, Web UI Manager reject, delegate Invitations Invitations Certification Workflow Implementer Accept, Certifiers Review, Implementers certify, Web UI Manager Web UI confirm correct © 2012 Hitachi ID Systems, Inc.. All rights reserved. 9
  • 10. Slide Presentation 16 Multi-Master Architecture ix, Un , D, /390 A S P, d O DA 0 e tiv or L S40 d, Na assw ge A st e p han Password -ho pps User c Synch ud a Trigger Target Systems Clo aaS Systems S with local agent: OS/390, Unix, PW Reverse ate Hitachi ID older RSA lid Web Proxy Va Application VPN s Target Systems Server(s) ice Server erv with remote agent: IVR bS SQL Server DB We AD, SQL, SAP, Notes, etc ork Load SQL etw Balancer DB lN ca ails Lo Target Systems Em SQL/Oracle ter en Firewall SMTP or ets Notes Mail Tic k ge r t aC &T r ig Da Incident up te TCP/IP + AES Management Lo ok mo Various Protocols System System of Firewall Re Record Proxy Server Secure Native Protocol (if needed) HTTPS © 2012 Hitachi ID Systems, Inc.. All rights reserved. 10
  • 11. Slide Presentation 17 Included Connectors Many integrations to target systems included in the base price: Directories: Servers: Databases: Any LDAP, AD, WinNT, NDS, Windows NT, 2000, 2003, Oracle, Sybase, SQL Server, eDirectory, NIS/NIS+. 2008, Samba, Novell, DB2/UDB, Informix, ODBC. SharePoint. Unix: Mainframes, Midrange: HDD Encryption: Linux, Solaris, AIX, HPUX, 24 z/OS: RACF, ACF2, McAfee, CheckPoint. more. TopSecret. iSeries, OpenVMS. ERP: Collaboration: Tokens, Smart Cards: JDE, Oracle eBiz, PeopleSoft, Lotus Notes, Exchange, RSA SecurID, SafeWord, SAP R/3 and ECC 6, Siebel, GroupWise, BlackBerry ES. RADIUS, ActivIdentity, Business Objects. Schlumberger. WebSSO: Help Desk: Cloud/SaaS: CA Siteminder, IBM TAM, BMC Remedy, SDE, HP SM, WebEx, Google Apps, Oracle AM, RSA Access CA Unicenter, Assyst, HEAT, Salesforce.com, SOAP Manager. Altiris, Track-It! (generic). 18 Simple Integration with Custom Apps • ID Management Suite easily integrates with custom, vertical and hosted applications using flexible agents . • Each flexible agent connects to a class of applications: – API bindings (C, C++, Java, COM, ActiveX, MQ Series). – Telnet / TN3270 / TN5250 / sessions with TLS or SSL. – SSH sessions. – HTTP(S) administrative interfaces. – Web services. – Win32 and Unix command-line administration programs. – SQL scripts. – Custom LDAP attributes. • Integration takes a few hours to a few days. • Fixed cost service available from Hitachi ID. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 11
  • 12. Slide Presentation 19 IAM Project Risk Management IAM projects often take too long and cost too Risk management much. Why? • Data quality: • Combine automation and self-service for clean up. – Nonstandard, disconnected IDs – Incorrect, old identity data. • Never-ending role engineering: • Start deployment with just a few roles. • Add roles gradually, based on demand. – Role based access control is a good objective, but... – It can be slow and costly to develop and maintain roles. – Some users just don’t fit. • Too many workflows: • Implement a generic change management system. • Custom forms for just the most popular – Defining too many forms, processes requests. takes too long. – One form, one process per change type? Per system? 20 Hitachi ID Technology Advantages • More features and functionality for less money: – Lower initial and ongoing investment (License scheme) – Lower on-going administration costs • Technology (not services) drives down deployment costs: – Auto-discovery. – Self-service login ID reconciliation. – More pre-built connectors. – Support for multi-tenant installation. – Functional across customer firewalls. – Avoids role engineering. – Dynamic workflow. – Full functionality without client software. – Easier to extend to custom applications/targets. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 12
  • 13. Slide Presentation 21 ID Management Suite Summary • A rich suite of identity and access management products, with over 11M licensed users, that can: – Discover and connect user objects from every system. – Streamline administration of users, entitlements and login credentials. – Construct and maintain OrgChart data. – Secure access to privileged accounts on thousands of systems. • Lock down security and comply with regulations requiring internal controls. • Reduce operating costs and improve user productivity. • Flexible, scalable, reliable, available. 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: PRCS:pres www.Hitachi-ID.com Date: March 1, 2012