Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
© 2019 Jack Henry & Associates, Inc.®1 © 2019 Jack Henry & Associates, Inc.®
JHA Client Services ConsultingSM – SilverLake®
Global Security
Donna England
April 17, 2019
Jack Henry & Associates, Inc.®
© 2019 Jack Henry & Associates, Inc.®2
Legal Disclaimer: Dates contained in this presentation are
provided as estimates only and can be changed at any time
at the sole discretion of Jack Henry & Associates, Inc. This
information may not be incorporated into any contract and
should not be relied upon in making purchasing decisions.
© 2019 Jack Henry & Associates, Inc.®3
Agenda
• Introductions
• What is Global Security
• Global Security Advantages
• Why Engage Client Services
• Global Security Implementation Process
• Global Security Additional Offerings
© 2019 Jack Henry & Associates, Inc.®4
Donna England brings almost 39 years of wide-ranging experience to her role as a Consulting Services Manager. Donna is one of
the founding consultants with Intellix, which was merged into the JHA Client Services Consulting group in 2015.
Her career in financial services began in a profitable, community-based financial institution where she oversaw the accounting
and audit functions. After being involved in several system implementation or conversion projects, she moved to the technology
sides of the business, joining Broadway & Seymour (later purchased by JHA) in 1991. She began as a business analyst in the
Installation department, directing the mapping and conversion of customer data for both deposit and loan applications on the
Liberty system. She then moved to customer support, eventually managing the level two support team and working closely with
R&D in the role of business analyst.
After JHA acquired the Liberty product, England moved back to the Installation group, working with CIF 20/20® Outlink banks,
managing the training and programmer groups. Training bank users on the system, responding to unique customer requests, and
trouble-shooting implementation issues established the strong foundation she draws on to originate the system-based solutions
she currently delivers to JHA Client Services Consulting clients.
Donna currently lives in Lexington, North Carolina with her husband Hugh and two dogs Jazz and Gracie.
Donna England
Consulting Services Manager
JHA Client Services ConsultingSM
© 2019 Jack Henry & Associates, Inc.®5
What is Global Security
• Global Security is an alternative way to set up user
access within SilverLake®
– Template-based functionality
• Allows for role or group defined access
• Locks down SilverLake® more efficiently
• Allows the use of standard SilverLake ® menus
– Improved reporting capabilities
© 2019 Jack Henry & Associates, Inc.®6
Global Security Advantages
• Allows for a role-based system
– Templates help to ensure consistent access
© 2019 Jack Henry & Associates, Inc.®7
Global Security Advantages
• Allows for a role-based system
– Templates help to ensure consistent access
– Streamlines onboarding process and user maintenance
© 2019 Jack Henry & Associates, Inc.®8
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
– Identify and remove unneeded access
© 2019 Jack Henry & Associates, Inc.®9
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
– Identify and remove unneeded access
– Helps managers look at what is truly needed for each role
© 2019 Jack Henry & Associates, Inc.®10
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
– Identify and remove unneeded access
– Helps managers look at what is truly needed for each role
– Review for necessary segregation of duties, internal controls
© 2019 Jack Henry & Associates, Inc.®11
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
• Reduces risk in Xperience
– Easier to identify excess access
© 2019 Jack Henry & Associates, Inc.®12
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
• Reduces risk in Xperience
– Easier to identify excess access
– Streamlines navigation
© 2019 Jack Henry & Associates, Inc.®13
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
• Reduces risk in Xperience
• Reduces overhead of maintaining custom menus
– Standard menus can be used without risking excess access
© 2019 Jack Henry & Associates, Inc.®14
Global Security Advantages
• Allows for a role-based system
• Rebuilding access allows for a thorough review
• Reduces risk in Xperience
• Reduces overhead of maintaining custom menus
• Simplifies reporting needed for review and approval of
user access
– Standard reports easier to understand for managers, auditors,
examiners
© 2019 Jack Henry & Associates, Inc.®15
Why Should I Engage Client Services?
• It can be challenging to get accurate and timely
information from all bank departments.
© 2019 Jack Henry & Associates, Inc.®16
Why Should I Engage Client Services?
• It can be challenging to get accurate and timely
information from all bank departments.
• It can be time-consuming to map existing user access to
role-based access using SilverLake® menus.
© 2019 Jack Henry & Associates, Inc.®17
Why Should I Engage Client Services?
• It can be challenging to get accurate and timely
information from all bank departments.
• It can be time-consuming to map existing user access to
role-based access using SilverLake® menus.
• Resource constraints make it difficult to complete a
project of this magnitude, while regulatory and audit
pressures make it a high-priority project.
© 2019 Jack Henry & Associates, Inc.®18
Why Should I Engage Client Services?
• It can be challenging to get accurate and timely
information from all bank departments.
• It can be time-consuming to map existing user access to
role-based access using SilverLake® menus.
• Resource constraints make it difficult to complete a
project of this magnitude, while regulatory and audit
pressures make it a high-priority project.
• Client Services builds your system ‘from scratch’.
© 2019 Jack Henry & Associates, Inc.®19
What Does The Process Look Like?
Project phases
• Kickoff
• Discovery
• Build
• Test
• Live
© 2019 Jack Henry & Associates, Inc.®20
Global Security Process
• Kickoff
– Approximately six weeks prior to initial onsite visit
– Call with Bank’s project team to discuss
• High level project plan
• Questions arising from RFI responses
• Verify onsite dates
• Discuss departmental homework questionnaire
• Answer any questions the Bank may have
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®21
Global Security Process
• Discovery phase
– Consultant(s) come onsite
• Interview Department managers or Role owners
– Define roles needed within each department or group
– Determine necessary system access based on role definition and
actual system usage
– Use Least Privileged Access concept
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®22
Global Security Process
• Discovery phase
– Consultant(s) come onsite
• Interview Department managers or Role owners
• Discuss existing or desired use of SilverLake ® security features for
– Wire Security
– General Ledger Security
– EIP (NSF) Limits
– SSN/TIN Masking
– Insider and Dormant Access
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®23
Global Security Process
• Discovery phase
– Consultant(s) come onsite
• Interview Department managers or Role owners
• Discuss existing or desired use of SilverLake® security features
• Timing
– One to three consultants onsite for three days
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®24
Global Security Process
• Build phase
– Consultant(s) work remotely to
• Build the necessary Global Security templates
– Six required templates
» Profile
» Product
» Insider Code
» Security
» Core Applications
» Menu Options
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®25
Global Security Process
• Build phase
– Consultant(s) work remotely to
• Build all the necessary Global Security templates
• Create Template Groupings and Group IDs
– Based on roles defined during Discovery interviews
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®26
Global Security Process
• Build phase
– Consultant(s) work remotely to
• Build all the necessary Global Security templates
• Create Template Groupings and Group IDs
• Build User IDs for existing users
– Can build User IDs without disrupting current MENUMENU access
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®27
Global Security Process
• Build phase
– Consultant(s) work remotely to
• Build all the necessary Global Security templates
• Create Template Groupings and Group IDs
• Build User IDs for existing users
• Timing
– Elapsed time of one to three weeks
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®28
Global Security Process
• Test phase
– Consultant(s) come onsite
• Conduct training sessions for users selected as Early Adopters
– make sure they have access to (and can find) all the menu options
necessary to perform their assigned functions
– become comfortable with the navigation to provide assistance to others
in the group during live phase
• Make modifications to templates to address any issues identified by
Early Adopter users
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®29
Global Security Process
• Test phase– Consultant(s) come onsite
• Conduct training sessions for users selected as Early Adopters
• Make modifications to templates to address any issues identified by Early Adopter users
• Conduct training for System Administrators
– How to support existing users
– How to add new users
– How to create new and change existing templates
– How to create new and change groupings
– How to generate system reports for user access
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®30
Global Security Process
• Test phase
– Consultant(s) come onsite
• Conduct training sessions for users selected as Early Adopters
• Make modifications to templates to address any issues identified by
Early Adopter users
• Conduct training for System Administrators
• Timing
– One or two consultants onsite for three days
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®31
Global Security Process
• Live phase
– Consultant(s) work remotely to activate remaining users
– Assist system administrators with any additional changes as
identified by users
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®32
Global Security Process
• Live phase
– Consultant(s) work remotely to activate remaining users
– Assist system administrators with any additional changes as
identified by users
– Timing
• Up to one week
• InterviewDiscovery
Needed AccessBuild
• Early AdoptersTest Live
© 2019 Jack Henry & Associates, Inc.®33
• Onsite consulting
– Two or three days onsite
– Work with system administrators
• Deep dive into six required templates
• Design system configuration
• Build templates, groupings, users as time allows
• Discuss rollout plan
Global Security Additional Services
© 2019 Jack Henry & Associates, Inc.®34
• WebEx consulting
– Four to eight hours
– Work with system administrators
• Deep dive into six required templates
• Discuss system configuration
• Answer specific questions
Global Security Additional Services
© 2019 Jack Henry & Associates, Inc.®35
• Global Security Review
– Global Security already implemented
• Acquisition or reorganization requires new role definitions
• New system administrators
• Converting bank
Global Security Additional Services
© 2019 Jack Henry & Associates, Inc.®36
• Global Security Review
– Discovery interviews with some or all departments
– Existing templates modified or new templates built to define new
or changed roles
– Hands-on training for system administrators
– Changes rolled out to all or select users
Global Security Additional Services
© 2019 Jack Henry & Associates, Inc.®37
Questions?