Identity Access Management Fishnet Security

Preview:

DESCRIPTION

IAM Practice Overview

Citation preview

ID#12SS0002 Last Modified 01.19.2012

© 2012 FishNet Security. All rights reserved.Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406

Securely Enabling Business

Identity and Access Management

OverviewFishNet Security is the nation’s leading full-service information security solutions provider, with extensive consulting and systems integration offerings focused on Identity and Access Management (IAM). Here is what we offer:

• A highly-trained, U.S.-based expert team of IAM specialists to bring a wealth of diverse knowledge and experience to every engagement.

• Strong collaborative relationships with best-in-breed vendors combined with a technology-agnostic approach to IAM challenges allow strategic processes to self-identify the best solution.

• With over 30 offices and training centers nationwide, our national presence is backed by senior leadership with a regional focus.

What We DoAs a strategic partner, FishNet Security delivers unmatched IAM knowledge and solution programs that can help you effect lasting change in IT and business processes. Our vast experience developing strategic approaches and solutions for nearly every vertical market allows us to leverage a wealth of experience and expertise in solving your IAM challenges. Through our proven IAM5™ Process , we provide strategic guidance, implementation and support services that incorporate leading IAM platforms and specialized service offerings.

IAM5 Phase Strategic Services Tactical Services

1. Envisioning Phase• IAM5 Workshop• Architectural Design Strategy

• Existing Deployment Health Check

2. Planning & Preparation Phase

• Compliance & Identity Management Readiness (CIMR)

• Vendor Selection and RFP Management• IAM Program and Governance• Business Process Optimization Assessment

• IAM Replacement Analysis• IAM Maturity Assessment• Credibility Phase Scope for Detailed Analysis and

Design

3. Credibility Phase

• Managed Services for Identity• Identity / Role Management QuickStart• Identity Management Rapid Application

Framework

• Product Replacement Deployment Project• Solution Development, Deployment &

Implementation• Directory / AD clean up• IAM5 Foundation Platform

4. Growth & Sustainment Phase

• Operational Sustainment from the Credibility Phase

• Implementation of Expanded Solution Functionality

• Adoption of IAM Governance Committee

• Growth in the Deployment of new functions• Production Support• Knowledge Transfer & Training

5. Optimization & Transitioning Phase

• Operational Sustainment of multiple production releases

• Completion of a Health Check to optimize performance

• Implementation of expanded functionality• Roadmap and Strategy Refresh

• Continued Expansion & Growth of previous phase releases

• Technology Upgrade• Complete Transition of IP and responsibilities to

Client• Infrastructure Optimization

Identity and Access Management

ID#12SS0002 Last Modified 01.19.2012

© 2012 FishNet Security. All rights reserved.Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406

About FishNet SecurityWe Focus on the Threat so You can Focus on the Opportunity.FishNet Security, the No. 1 provider of information security solutions that combine technology, services, support and training, enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to more than 5,000 clients nationwide. For more information about FishNet Security, visit www.fishnetsecurity.com, www.facebook.com/fishnetsecurity and www.twitter.com/fishnetsecurity.

ServicesFull IAM Lifecycle Service Delivery includes:

• Strategic Advisory• Full Integration, Customization & Deployment Services• Program/Project Management• Full IAM SDLC Support• Cloud-Based IAM Offering• 24x7x365 Support Center

Solutions• Business Processes Optimization:

• Security:

• Compliance:

• Administrative Efficiencies:

Strategic Partners

ͳ User Lifecycle ͳ Access Review

ͳ Simplified Sign-On ͳ Federation

ͳ Strong Auth ͳ AuthZ Services

ͳ Role Mining ͳ Reporting

ͳ Access Certification ͳ Remediation

ͳ Password Self-Service ͳ Delegated Administration

ͳ Simulated Provisioning ͳ eProvisioning

Our success is built on delivering strategic solutions for any IAM challenge, and our IAM5 Methodology is founded on a proven philosophical and analytical approach to delivery developed through hundreds of diverse engagements.

ͳ Program Governance ͳ Asset Management

Recommended