Security Management...
The Challenge:
How to manage your environment with respect to Security can be a time
consuming endeavor. Some of the typical day-to-day issues facing IT
Security Managers are:
-
Identity lifecycle management (user self-care, enrollment and
provisioning)
-
Identity control (access and privacy control, single sign-on and
auditing)
-
Identity federation (sharing user authentication and attribute
information between trusted Web services applications)
-
Identity foundation (directory, directory integration and workflow)
-
Strong Audit Control (purge of invalid accounts)
-
Password Reset Automation and Self-Service
-
Automated starter/leaver process
|
|
|
The Solution:
NetworkingPS can help you determine and
implement the optimum management infrastructure for your Security Environment.
We can provide:
Current Environment Assessment –
While clients are preparing to move into the Identity Management arena,
gaining a detailed understanding of the current environment is critical to
moving into the design phase. At NetworkingPS we have broad based experience
in performing detailed assessments which include documentation of current
state user management, current state use cases, and recommendations to move
to a proper Idm solution.
Requirements Gathering – Many
clients have vision of what they want from an Identity Management solution,
but are not totally clear on all of their requirements. In order to properly
develop a detailed solution design, having a solid set of requirements for
each of the areas to be addressed ensures that project objectives are
understood and designed accordingly. We have worked with clients in great
detail to extract requirements that will help them achieve their goals,
while at the same time recognize value at each stage of the deployment.
Detailed Solution Design – At
NetworkingPS we believe that the solution design is the apex of a successful
deployment. Taking into account the information obtained from the assessment
and requirements gathering activities, we develop a detailed solution design
that becomes the blueprint for all deployment activity. This solution design
includes:
-
Identity Management Architecture
-
Technical Design
-
Hardware Specifications
-
Operational Model
-
Workflow Design
-
Process Re-engineering
-
Role Based Engineering (RBAC)
-
System Support Model
-
System Test Cases
|
|
-
Future State Use Cases
-
Implementation Project Plan Detail through Platform Deployment and
Application Integration
-
Knowledge Transfer Plan
-
Business Continuity Review
-
IdM Configuration Parameters
-
Provisioning Policies
-
Customization Specifications
|
Implementation Services – We
employ highly trained, detail oriented, seasoned individuals. Our staff is
well versed in utilization of best practices and driving value at each stage
of the implementation. We work as a unified team with the client to ensure
that knowledge transfer is taking place throughout the engagement, enabling
self sufficiency at the conclusion of the engagement.
Performance Tuning and
High Availability Consulting – Over time, as you add features and
functionality to your Identity Management environment, you may be impacting
the overall performance of your system. Through proven methodologies and
procedures, NetworkingPS can increase the performance of your IdM
configuration to obtain the best results possible. These results are
recognized in the form of improved response time, increased user
concurrency, and decreased cost from not purchasing additional hardware
until absolutely necessary. Understanding and correct execution of
configuration of the software, application and operating system dependencies
is a task best left for experts with experience. At NetworkingPS we have the
experience to perform these tasks.
For More
Information
To view or download a relevant white paper entitled "Succeeding with Automated
Identity Management Implementations," please
click
here. |