SlideShare a Scribd company logo
1 of 19
Download to read offline
ca Securecenter 
Identity As A Service Evaluation, 
Implementation, Realized Benefits 
Drew Koenig 
SCT10S @binaryblogger #CAWorld 
Manager of Information Security & Risk Management 
Univita Health
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
How to evaluate IAM offerings and the trade- off between the customization level available on-premises, and the speed/cost model benefits of SaaS. How CA Secure Cloud (formerly CA CloudMinder™) can efficiently enable the business with faster implementation times, improved compliance and a reduction in infrastructure and support costs. 
Drew Koenig 
Univita Health 
Manager of Information Security & Risk Management 
@BinaryBlogger 
Binaryblogger.com
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Agenda 
INTRO 
IDENTITY MANAGEMENT BACKGROUND 
Q&A 
THE MOVE TO THE CLOUD 
JUSTIFICATION –COSTS AND TIME 
REALIZED BENEFITS 
1 
2 
3 
4 
5 
6
4 
© 2014 CA. ALL RIGHTS RESERVED. 
Introduction 
Information security professional for over 15 years 
–Financial and health industry 
–Focused on IAM for a majority of the career 
Made the move from on-premises IdMto the cloud 
–CA Identity Manager to CA Secure Cloud 
–Primary reason was speed of enablement and overall cost value 
Drew Koenig –Manager of Information Security and Risk Management
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Background 
On-premises for 2 years, hand built from the ground up. 
–Windows based, SQL DBs 
–Out-of-the-box CA Identity Manager installation (JBOSS, CA Directory, etc…) 
–Dev and prod, internally accessible only, no CA Single Sign-On 
The team was only 1 to 1 ½ FTE to maintain and advance it 
The expanding business use became time consuming 
On-premises Environment 
CA Identity Manager 12.6 SP2 on-premise
6 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Background 
Self-service password reset 
–Limited to internal access only, need for internet capability 
Service Desk features for resets, unlocks and other account maintenance features 
Basic account provisioning with heavy custom flows and processes 
On-premises Environment 
CA Identity Manager 12.6 SP2 on-premise
7 
© 2014 CA. ALL RIGHTS RESERVED. 
The Move To The Cloud 
Participated in the early alpha tests of CA Secure Cloud 
Accomplished more in 1 week than 3 months on-premises start to finish 
–Build, configuration, test 
Made the strategic decision to move 
Alpha to Production 
CA Secure Cloud (formerly know as CA CloudMinder™)
8 
© 2014 CA. ALL RIGHTS RESERVED. 
The Move To The Cloud 
The early proposal was declined immediately 
Initially management only looked at the license costs vs. subscription costs, ignored the proposed value 
The business looked at IAM as a technology project, not as business enablement 
Initial Proposal 
CA Secure Cloud 
X
9 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
Went back and broke down the full set of CA Secure Cloud services 
Laid out exactly what the subscription delivered 
Built a cost model to show a comparable on-premises build out 
Expanded internally with HR and Compliance to gain support 
True Business Value, Look At Everything 
IAM
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Components 
IdentityManagement Stack 
Directory Services 
Provisioning Engine 
Workflows 
Identity and Role Admin 
Identity Verification 
Authentication/Authorization/ Federation 
IT Platform 
Databases 
OperatingSystems / Virtualization 
Storage 
Networking 
Hardware 
HA / DR 
Consumable Identity Service 
ServiceInterfaces 
Customer SpecificConfigurations 
Customizations 
To do a legitimate comparison, I laid out the costs to build an on-premises environment that could provide the same set of services that we would receive from CA Secure Cloud
11 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
–CA Identity Manager 
–CA Single Sign-On 
–CA Federation 
–CA Advanced Authentication 
–Microsoft Windows, SQL 
–NetAppStorage, VMWare, HP 
The Cost To Build Secure Cloud Capabilities On-Premises 
Required Components
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
Build three environments 
–Preview, Staging, Production 
–Approx. 5 servers per environment 
Patching, troubleshooting, maintenance 
–Java, Microsoft, CA, backups 
All outages, issues, problem resolution are yours to solve 
–Even with vendor assistance 
Infrastructure 
Footprint 
Preview 
Staging 
Production
13 
© 2014 CA. ALL RIGHTS RESERVED. 
IDaaSAllows Full Focus On IdM 
IdentityManagement StackDirectory ServicesProvisioning Engine 
Workflows 
Identity and Role Admin 
Identity VerificationAuthentication/Authorization/Federation 
IT Platform 
Databases 
OperatingSystems / Virtualization 
Storage 
Networking 
Hardware 
HA / DR 
Consumable Identity Service 
ServiceInterfaces 
Customer SpecificConfigurations 
Customizations 
•Eliminated busy work and trouble shooting 
•Allowed the Identity Management team to focus on Identity Management
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Decision to Move 
Total cost to build was less than pure license vs. subscription 
Maintenance was a fraction of previous cost 
–Patching alone saved 20-40 company man-hours a month 
Complete justification model made it an easy business decision 
This approach is now used for all cloud service evaluations 
–Cloud service or ‘build it ourselves’ total cost assessment 
Value Prevailed Over Cost 
Components
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Instant Benefits 
Within hours of the service being enabled we were online 
Small JCS server to hook into AD for resets took less than an hour 
One “Explore and Correlate” and all the users were in Secure Cloud and we were resetting passwords through internet 
Off and Running 
Days not months
16 
© 2014 CA. ALL RIGHTS RESERVED. 
Instant Benefits 
Unique application model required B2B users deep account access 
Until CA Secure Cloud the only way they could manage accounts was to call the Service Desk –hundreds a month 
Now they go to CA Secure Cloud -calls reduced 80 percent in days for B2B calls 
Off and Running 
Days not months
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Summary 
Improvements In All Areas 
Overall the move to CA Secure Cloud will save the company money in time, resources and speed to deliver new identity management services to our employees and customers. There is no pressing need to grow the internal team as the capabilities grow. Through the CA Secure Cloud services we have closed several audit findings, strengthened partnership confidence and are able to focus more on improving advanced offerings such as deeper role based provisioning, federation portal capabilities and reporting. 
The success of the move was not to look at the costs alone but the total value of what those costs brought in terms of services, then compare those to what it would take to do it yourself.
18 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
19 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation

More Related Content

What's hot

What's hot (20)

Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
 
Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce Identity
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Camunda BPM - Said Mengi
Camunda BPM - Said MengiCamunda BPM - Said Mengi
Camunda BPM - Said Mengi
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 

Viewers also liked

Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
vineet jain
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod Upadhyay
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
webhostingguy
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
Prakhar Sood
 

Viewers also liked (12)

Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity Suite
 
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic SolutionsBe the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 

Similar to Identity As A Service Evaluation, Implementation, Realized Benefits

엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
Amazon Web Services Korea
 

Similar to Identity As A Service Evaluation, Implementation, Realized Benefits (20)

AWS Cloud Adoption Framework and Workshops
AWS Cloud Adoption Framework and WorkshopsAWS Cloud Adoption Framework and Workshops
AWS Cloud Adoption Framework and Workshops
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
AWS cloud adoption framework (caf)
AWS cloud adoption framework (caf)AWS cloud adoption framework (caf)
AWS cloud adoption framework (caf)
 
Enterprise workloads on AWS
Enterprise workloads on AWSEnterprise workloads on AWS
Enterprise workloads on AWS
 
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
 
企業雲端化之旅
企業雲端化之旅企業雲端化之旅
企業雲端化之旅
 
Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...
 
Modernising the Enterprise: An Evening with the AWS Enterprise User Group
Modernising the Enterprise: An Evening with the AWS Enterprise User GroupModernising the Enterprise: An Evening with the AWS Enterprise User Group
Modernising the Enterprise: An Evening with the AWS Enterprise User Group
 
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloudCloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
 
Cloud financials benefits the ROI business case
Cloud financials benefits the ROI business case Cloud financials benefits the ROI business case
Cloud financials benefits the ROI business case
 
Stages of Adoption leading to Complete Migration
Stages of Adoption leading to Complete MigrationStages of Adoption leading to Complete Migration
Stages of Adoption leading to Complete Migration
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...
 
Startup Saturday Blr Dec08 - Saas To Cloud computing
Startup Saturday Blr Dec08 - Saas To Cloud computingStartup Saturday Blr Dec08 - Saas To Cloud computing
Startup Saturday Blr Dec08 - Saas To Cloud computing
 
Startup Saturday Bangalore - Saas To Cloud computing
Startup Saturday Bangalore - Saas To Cloud computingStartup Saturday Bangalore - Saas To Cloud computing
Startup Saturday Bangalore - Saas To Cloud computing
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
 

More from CA Technologies

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Identity As A Service Evaluation, Implementation, Realized Benefits

  • 1. ca Securecenter Identity As A Service Evaluation, Implementation, Realized Benefits Drew Koenig SCT10S @binaryblogger #CAWorld Manager of Information Security & Risk Management Univita Health
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract How to evaluate IAM offerings and the trade- off between the customization level available on-premises, and the speed/cost model benefits of SaaS. How CA Secure Cloud (formerly CA CloudMinder™) can efficiently enable the business with faster implementation times, improved compliance and a reduction in infrastructure and support costs. Drew Koenig Univita Health Manager of Information Security & Risk Management @BinaryBlogger Binaryblogger.com
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Agenda INTRO IDENTITY MANAGEMENT BACKGROUND Q&A THE MOVE TO THE CLOUD JUSTIFICATION –COSTS AND TIME REALIZED BENEFITS 1 2 3 4 5 6
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. Introduction Information security professional for over 15 years –Financial and health industry –Focused on IAM for a majority of the career Made the move from on-premises IdMto the cloud –CA Identity Manager to CA Secure Cloud –Primary reason was speed of enablement and overall cost value Drew Koenig –Manager of Information Security and Risk Management
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Background On-premises for 2 years, hand built from the ground up. –Windows based, SQL DBs –Out-of-the-box CA Identity Manager installation (JBOSS, CA Directory, etc…) –Dev and prod, internally accessible only, no CA Single Sign-On The team was only 1 to 1 ½ FTE to maintain and advance it The expanding business use became time consuming On-premises Environment CA Identity Manager 12.6 SP2 on-premise
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Background Self-service password reset –Limited to internal access only, need for internet capability Service Desk features for resets, unlocks and other account maintenance features Basic account provisioning with heavy custom flows and processes On-premises Environment CA Identity Manager 12.6 SP2 on-premise
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. The Move To The Cloud Participated in the early alpha tests of CA Secure Cloud Accomplished more in 1 week than 3 months on-premises start to finish –Build, configuration, test Made the strategic decision to move Alpha to Production CA Secure Cloud (formerly know as CA CloudMinder™)
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. The Move To The Cloud The early proposal was declined immediately Initially management only looked at the license costs vs. subscription costs, ignored the proposed value The business looked at IAM as a technology project, not as business enablement Initial Proposal CA Secure Cloud X
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. Justification Went back and broke down the full set of CA Secure Cloud services Laid out exactly what the subscription delivered Built a cost model to show a comparable on-premises build out Expanded internally with HR and Compliance to gain support True Business Value, Look At Everything IAM
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Components IdentityManagement Stack Directory Services Provisioning Engine Workflows Identity and Role Admin Identity Verification Authentication/Authorization/ Federation IT Platform Databases OperatingSystems / Virtualization Storage Networking Hardware HA / DR Consumable Identity Service ServiceInterfaces Customer SpecificConfigurations Customizations To do a legitimate comparison, I laid out the costs to build an on-premises environment that could provide the same set of services that we would receive from CA Secure Cloud
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. Justification –CA Identity Manager –CA Single Sign-On –CA Federation –CA Advanced Authentication –Microsoft Windows, SQL –NetAppStorage, VMWare, HP The Cost To Build Secure Cloud Capabilities On-Premises Required Components
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Justification Build three environments –Preview, Staging, Production –Approx. 5 servers per environment Patching, troubleshooting, maintenance –Java, Microsoft, CA, backups All outages, issues, problem resolution are yours to solve –Even with vendor assistance Infrastructure Footprint Preview Staging Production
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. IDaaSAllows Full Focus On IdM IdentityManagement StackDirectory ServicesProvisioning Engine Workflows Identity and Role Admin Identity VerificationAuthentication/Authorization/Federation IT Platform Databases OperatingSystems / Virtualization Storage Networking Hardware HA / DR Consumable Identity Service ServiceInterfaces Customer SpecificConfigurations Customizations •Eliminated busy work and trouble shooting •Allowed the Identity Management team to focus on Identity Management
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Decision to Move Total cost to build was less than pure license vs. subscription Maintenance was a fraction of previous cost –Patching alone saved 20-40 company man-hours a month Complete justification model made it an easy business decision This approach is now used for all cloud service evaluations –Cloud service or ‘build it ourselves’ total cost assessment Value Prevailed Over Cost Components
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. Instant Benefits Within hours of the service being enabled we were online Small JCS server to hook into AD for resets took less than an hour One “Explore and Correlate” and all the users were in Secure Cloud and we were resetting passwords through internet Off and Running Days not months
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. Instant Benefits Unique application model required B2B users deep account access Until CA Secure Cloud the only way they could manage accounts was to call the Service Desk –hundreds a month Now they go to CA Secure Cloud -calls reduced 80 percent in days for B2B calls Off and Running Days not months
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Summary Improvements In All Areas Overall the move to CA Secure Cloud will save the company money in time, resources and speed to deliver new identity management services to our employees and customers. There is no pressing need to grow the internal team as the capabilities grow. Through the CA Secure Cloud services we have closed several audit findings, strengthened partnership confidence and are able to focus more on improving advanced offerings such as deeper role based provisioning, federation portal capabilities and reporting. The success of the move was not to look at the costs alone but the total value of what those costs brought in terms of services, then compare those to what it would take to do it yourself.
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation