0% found this document useful (0 votes)
55 views6 pages

IAM Strategy

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 6

salesinfo@pdsit.net | PDSIT.

net | 800-966-6090

IAM ROADMAP (2-3 weeks)


Global Brand Succeeds with Identity Management Strategy
This is Ideal for:
Companies that are getting started,
you are not sure where to head or how
to allocate resources and what the
dependencies are
Companies looking to be pointed in the
right direction
Companies that have an existing program
and want to set next phase of work
Companies looking to get alignment
between business and IT to move forward

Project Goals:
• Identify relevant, business-driven opportunities for IAM to enhance your service levels
• Facilitate the identification of specific next steps as related to the pursuit of IaM initiatives
• Develop IAM Roadmap
• Provide knowledge and insight related to IAM trends and best practices
salesinfo@pdsit.net | PDSIT.net | 800-966-6090

Methodology:
Global Brand Succeeds with Identity Management Strategy

Facilitated
Sessions

Stakeholder Initiative

Workshops Requirements Roadmap


Prioritization Readout
Validation /Plan

Data Gap
Ownership Analysis

Interviews

Deliverables:
• Identified gaps in provisioning processes • Recommendations to address issues
• Identified gaps in security policies • IAM Roadmap to phase out the work
• Identified gaps in IAM Architecture
salesinfo@pdsit.net | PDSIT.net | 800-966-6090

IDENTITY MANAGEMENT STRATEGY


Global Brand Succeeds with Identity Management Strategy
We understand your goals to be:
Support regulatory compliance (HIPPA, PCI, Increase user productivity by getting people
Sarbanes-Oxley, NERC, etc.) by having proper started quickly (if a new hire sits idle for a week
controls in place (Support successful Audit) and you multiply that by all new hires annually it
Reduce costs - centralize IT provisioning, equals millions of dollars)
reduce amount of IT staff (operations, Help Implement systems to automate reporting,
Desk) to support organization, automation of auditing and routine user administration
routine tasks Save time and money by going in with a strategic
Drive Operational efficiency - improve approach where you know each step and feel
service levels through automation, user confident in the direction your IAM project is
self-service tools (password reset, request going
workflows), automate routine security reports Governance - ensure that you have the
Manage Risk - better auditing, automate appropriate structure in place
user terminations (remove access promptly), Understand your customers better to build
policy-based compliance enforced by IAM deeper relationships and drive more sales
system, strong authentication, improve
logging/audit trail, reduce risk of security Partner with subject matter experts to guide
breaches, reduce insider threat risk you through the process
salesinfo@pdsit.net | PDSIT.net | 800-966-6090

IAM Strategy Methodology:


Global Brand Succeeds with Identity Management Strategy
Initiate Assess Plan Recommend Finalize

Identify Project Identify Project Stakeholders


Stakeholders

Stakeholder Meetings &


Conduct Gap High-Level Future Revise
Project Scope IAM Quationnaire
Analysis State Architecture Recommendations

Create IAM Interview Key Stakeholders/


Determine IAM Action Plan/ Socialize with
Questionnaire Conduct IAM Workshops
Phasing/Options Next Steps Senior Mgmt.

Gather & Review Identity Management


Review Materials Environment & Directories Identify Solution Document IAM Develop Final
Components Recommendations Presentation

Develop Review Compliance & Security


Schedule Reporting Needs Draft Future High Level Deliver Final
State Architecture Road Map Presentation

Inventory, Assess & Prioritize


Meeting IAM Opportunities

Finalize IAM
Project Plan Assess Current State
Arhitecture & Architecture &
& Objective IAM Environment State
Standards Strategy

Strategy Deliverables:
We know that each business is different and unique,
here are the starting points we’ve found most common

• Current state IAM business and technology assessment, • A high-level IAM support strategy including planning
including strengths, gaps, and opportunities for education & training and program management

• Agreed-upon IAM vision and goals linked to • IAM awareness and education, including key concepts,
organization’s strategic business objectives benefits, and best practices

• Business and technical assessment of IAM capabilities • Preliminary scoping of first-step or quick win
and requirements opportunity, including high level estimates of business
benefits and resource requirements
• An analysis of IAM technology gaps and future state
requirements • A visual road map showing the phases required to
implement future state IAM technical and business
• A future state Directory Services Architecture for IAM,
capabilities
including prioritized architectural requirements
• A 30-60-90 day action plan for short-term next steps
• A prioritized set of future state IAM capabilities,
opportunities, and initiatives • Summary slide presentation and executive readout
• An analysis of IAM governance and business processes
salesinfo@pdsit.net | PDSIT.net | 800-966-6090

PRODUCT EVALUATION WORKSHOP (3 weeks)


Global Brand Succeeds with Identity Management Strategy
This is ideal for:
Organizations that are not sure what
solution to buy
Organizations looking to change
technologies
Organizations that are implementing
IAM for the first time

There are a number of details that organizations must consider when evaluating products
and vendors for their identity management solution, including the following:

• Architectural fit with your network and application infrastructure, including


supported protocols, APIs, server/component topology and platforms
• Solution deployment flexibility to meet current and foreseen technical objectives
• Vendor product roadmap in line with your objectives
• Licensing professional services costs
• Anticipated vendor viability over the longer term
• Existing relationship with vendors

As part of our overarching approach outlined in the figure below, Idenhaus Consulting has a
phased methodology that facilitates an effective collaboration while at the same time driving
consensus and managing risk. A typical product evaluation engagement proceeds through
a series of activities designed to drive out key requirements and maintains the appropriate
focus on the evaluation criteria. Idenhaus Consulting conducts product evaluations along
three dimensions: Business Fit, Product Functionality, and Technology Platform.
salesinfo@pdsit.net | PDSIT.net | 800-966-6090

The process:
Global Brand Succeeds with Identity Management Strategy
• Identify key decision criteria
• Determine component weighting
Pew timeline:
• Refine tool and/or functionality
requirements
• Conduct on-site vendor demos (time Conduct Kickoff Meeting
permitting)
• Complete PEW score cards
• Perform due diligence in product
selection
• Refine business case (optional) Collect and Review
Existing Documentation

The deliverables:
• Interactive, facilitated sessions with Conduct Interviews
key stakeholders with Personnel
• PEW Documentation
– Key decision criteria
– Process & Functional Overview
– Product Evaluation Summary with Identify Vendors and
top ranked products Evaluate Products
– Documented Issues
– A presentation highlighting the
findings and recommendations
– Completed decision model
Develop Business Case

Recommendation for
Vendor Selection

You might also like