SlideShare a Scribd company logo
1 of 11
Identity & Access Management
Overview
BizTech Presentation
www.biztechmasters.com
1-888-666-1745
AGENDA
• Introduction
• What is Identity & Access Management (IAM)
• Why IAM
• Features of IAM
• Deployment Options
• Traditional Leading Vendors
• Gartner’s Magic Quadrant for IAM
• Q & A
© Copyright 2015 2
Introduction
• BizTech Risk & Security
• Attendees
– How this presentation can help you in your
current situation
© Copyright 2015 3
What is Identity & Access
Management
• What is a digital identity
– A digital identity is a digital representation of a
user in a system.
© Copyright 2015 4
Why Identity & Access Management
• Identity & Access Management helps to
– Manage user identities and access control
– Reduce costs
– Increase turnaround time to develop applications
– Automate identity provisioning and approval
workflows
– Have an enterprise view of a user’s identity
© Copyright 2015 5
Features of IAM
• Central Identity Provisioning/De-provisioning
• User lifecycle management
• Automation of help desk functions such as password
reset, user profile management
• Single Sign-on -
• Centrally managed access control for multiple
applications.
• No need to build security into each application
• Role based access control
• Improved security
© Copyright 2015 6
Deployment Options
• In-house installation
• Buy pre-configured virtual machine
• Cloud Based IAM Service
© Copyright 2015 7
Leading Traditional IAM Vendors
• Computer Associates (CA)
– Identity Manager
– SiteMinder
• Oracle
– Oracle Identity Manager (OIM), formerly Sun Identity
Manager (SIM)
– Oracle Access Manager (OAM)
• IBM
– Tivoli Identity Manager (TIM)
– Tivoli Access Manager (TAM)
© Copyright 2015 8
Gartner’s Magic Quadrant for IAM Service
© Copyright 2015 9
Gartner’s Magic Quadrant for IAM Software
© Copyright 2015 10
Q & A
• Questions & Answers
– Need help with Identity & Access Management
Strategy, Roadmap, Use cases, Implementation,
Testing, etc. ? Contact:
• Al Abbas, Practice Director
• aabbas@biztechmasters.com
• www.biztechmasters.com
• 1-888-666-1745
© Copyright 2015 11

More Related Content

Viewers also liked

Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusPrabath Siriwardena
 
ISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceAl Abbas, PMP, CISSP, MBA, MSc
 
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Probabilité +echantillonage
Probabilité +echantillonageProbabilité +echantillonage
Probabilité +echantillonageImad Cov
 

Viewers also liked (7)

Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
 
ISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer Confidence
 
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Probabilité +echantillonage
Probabilité +echantillonageProbabilité +echantillonage
Probabilité +echantillonage
 

BizTech-Identity and Access Management Webinar

  • 1. Identity & Access Management Overview BizTech Presentation www.biztechmasters.com 1-888-666-1745
  • 2. AGENDA • Introduction • What is Identity & Access Management (IAM) • Why IAM • Features of IAM • Deployment Options • Traditional Leading Vendors • Gartner’s Magic Quadrant for IAM • Q & A © Copyright 2015 2
  • 3. Introduction • BizTech Risk & Security • Attendees – How this presentation can help you in your current situation © Copyright 2015 3
  • 4. What is Identity & Access Management • What is a digital identity – A digital identity is a digital representation of a user in a system. © Copyright 2015 4
  • 5. Why Identity & Access Management • Identity & Access Management helps to – Manage user identities and access control – Reduce costs – Increase turnaround time to develop applications – Automate identity provisioning and approval workflows – Have an enterprise view of a user’s identity © Copyright 2015 5
  • 6. Features of IAM • Central Identity Provisioning/De-provisioning • User lifecycle management • Automation of help desk functions such as password reset, user profile management • Single Sign-on - • Centrally managed access control for multiple applications. • No need to build security into each application • Role based access control • Improved security © Copyright 2015 6
  • 7. Deployment Options • In-house installation • Buy pre-configured virtual machine • Cloud Based IAM Service © Copyright 2015 7
  • 8. Leading Traditional IAM Vendors • Computer Associates (CA) – Identity Manager – SiteMinder • Oracle – Oracle Identity Manager (OIM), formerly Sun Identity Manager (SIM) – Oracle Access Manager (OAM) • IBM – Tivoli Identity Manager (TIM) – Tivoli Access Manager (TAM) © Copyright 2015 8
  • 9. Gartner’s Magic Quadrant for IAM Service © Copyright 2015 9
  • 10. Gartner’s Magic Quadrant for IAM Software © Copyright 2015 10
  • 11. Q & A • Questions & Answers – Need help with Identity & Access Management Strategy, Roadmap, Use cases, Implementation, Testing, etc. ? Contact: • Al Abbas, Practice Director • aabbas@biztechmasters.com • www.biztechmasters.com • 1-888-666-1745 © Copyright 2015 11