Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise.

Similar presentations


Presentation on theme: "© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise."— Presentation transcript:

1 © 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise Security Solutions, Wipro Technologies

2 © 2010 Wipro Ltd - Confidential 2 Challenges eluding large scale success in Traditional “In-Sourced” IAM Programs Evolving “IDAAS” Models IDAAS – Principles – Components – Solution Highlights & Architecture – Roadmap – Summary of Benefits Evolution of Wipro’s IAM Agenda

3 © 2010 Wipro Ltd - Confidential 3 Challenges eluding large scale success in Traditional “In-Sourced” IAM Programs Cost High Op-ex in Manual User Access Management Significant Capex for rolling out a new IAM platform IAM Journey 3 R ’ s of IAM – A Customer ’ s View ROI Seems “ Utopian ” - Not confident of achieving the promised returns Difficulty in separating the hype from reality Risks Cost and time over-runs All the Risks of an Enterprise wide initiative Prohibitive cost of failure Resources Financial and Budgetary Constraints Right Technical and Managerial Talent Disparate Environments Scalability Issues Technology limitations Project Initiation Delayed Application Onboarding Post M&A IAM Integration Compliance High compliance risk due to manual process Technology Limitation Program Cost Escalation Delayed IAM Foundation (5-6 months)

4 © 2010 Wipro Ltd - Confidential 4 Tipping the Identity Mgmt Value Balance – The Only Mantra for IAM Program Success! The biggest challenge of management in most YOY identity management programs is reducing the Unit Cost Per Admin Operation and at the same time increasing the associated benefits of IAM Identity Management Value Balance OperationsTechnology Reporting Identity GRC How can the balance be tipped favorably? Reduce / Lighten the Unit Cost of IAM (Operational / Tactical Goal) Increase the Strategic Benefits of IAM Increased Employee Productivity Increased Access Accountability & Security Regulatory Compliance

5 © 2010 Wipro Ltd - Confidential 5 Introducing Identity Service Layers of Identity Assurance An organization needs to align its IT Security governance process to achieve an optimal level of harmony between the 3 key enabling layers of Identity Assurance: 1) Operations 2) Technology Automation 3) GRC Reporting Unit Cost of Identity Management A good indicator of this harmony and optimization is the Unit Cost of Identity Management Unit Cost of Identity Management The goal: to develop a Unified Service that integrates these three key enabling layers in a innovative way to deliver identity services at the lowest cost, fastest speed with maximum value. User Management Operations Identity Automation Base Technology Platform Identity GRC, Analytics & Compliance Layer 1 Layer 2 Layer 3

6 © 2010 Wipro Ltd - Confidential 6 Defining IDAAS Models* * As defined by Forrester IDAAS for SAAS IDAAS As SAAS Trusted Networks ModelIllustrationDescription Enable SSO for Enterprise users to SAAS business applications like Salesforce.com, Google Apps etc Companies that want to have user provisioning or single sign- on for their enterprise, internal- facing applications but can’t or don’t want to build out extensive IAM Federated identity and access management building the trust fabric and accompanying it with legal agreements IDAAS Enterprise 1 IDP SP 1 SP 2 IDAAS Salesforce.com XYZ.com Enterprise and Public Users Enterp rise 1 Enterp rise 2 1 2 3

7 © 2010 Wipro Ltd - Confidential 7 IDAAS – Principles behind Evolution Principles behind the IDAASImplementation Strategy Reduce time to deploy IAM foundation & automate processes Pre-baked 12 key IAM processes built in and ready to use Best of Breed Technology platform coverage of IAM and associated functional areas Integrated a mix of multi-vendor technology platforms for provisioning, SSO etc with multi-tenancy support Predictable Costs for IAM operations and automation cycles Standardized deployment, integration and operations model Stronger Process Security -Pre-baked Best Practices Process implementation Pre-baked processes

8 © 2010 Wipro Ltd - Confidential 8 Components of IDAAS Offering JML (Joiner, Mover, Leaver) Process Components Provisioning Resource Access Request Self Service Component Compliance 1 1 2 2 3 3 4 4 5 5 Wipro IDAAS On-boarding, Off-boarding, Update Termination, Rehire, Transfer, Processes pre-configured into solution Certification / Attestation processes Automated Role based Provisioning to wide variety application and platforms. Ease of integration and unique model of integration large # of instances Ease of use self service resource request Support for IT, Non-IT resources Configurable approval/delegation Unified request tracking Attestation/Recertification Reports for various compliance needs Unique Privilege user password management feature 6 6 Unique Kiosk based password reset Configurable Profile Management Change Password/Set security Q&A Helpdesk Password Reset/unlock account Privilege User Password Management Privilege User Password Management

9 © 2010 Wipro Ltd - Confidential 9 IDAAS Architecture

10 © 2010 Wipro Ltd - Confidential 10 Still early stages, but a lot can be done today Enterprises – Measure your IAM maturity level – Embrace the SOA lifestyle – Identify identity sources and virtualize an enterprise identity profile – Document and put in place processes to govern management and use of identity information – Get involved! Roadmap to IDAAS

11 © 2010 Wipro Ltd - Confidential 11 Identity Services will… …reduce complexity through increased ability to leverage critical identity data while removing the management and replication challenges …increase security by providing centralized policy management and a controls framework that can dynamically mitigate risks …create a flexible, adaptable, integrated platform on which to build applications …makes new types of de- perimeterized, identity-based business functionality viable IDAAS in Summary

12 © 2010 Wipro Ltd - Confidential 12 Evolution of Wipro’s IAM Capability Wipro- Websecure Product Vendor Professional IAM (Type 1) Managed IAM (Type 2) IAM In A Rack IDAAS (Type 3) 1999200220092010 Productized Solutions 2006 Professional Services IAM Transformatio nal Services Award Winning Productized Accelerator Hosted Solution

13 © 2010 Wipro Ltd - Confidential 13 Wipro’s Enterprise Security Solutions Practice Highlights Full Service end to end Security Solutions Provider Full Service end to end Security Solutions Provider Global Security Company – Ranked amongst Top 5 Global Security Company – Ranked amongst Top 5 Award Winning Solution Frameworks Innovation & Consulting Led Approach 3300 Security Consultants Advisory, Implementation, Operations and Managed Services Advisory, Implementation, Operations and Managed Services Over 200 Satisfied Customers Governance Risk & Compliance Identity & Access Management Application Security Data Protection & Privacy Security Strategy & Architecture Infrastructure Security Physical & IT Security Convergence

14 © 2010 Wipro Ltd - Confidential Thank You Vinod Muniyappa vinod.muniyappa@wipro.com Cell: 9845149862


Download ppt "© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise."

Similar presentations


Ads by Google