13

Ums 2009 Slide Share Ks

Embed Size (px)

Citation preview

Presentation of itmc ltd.

Business Consultants

Security Analysts

Background

Compliance

Security

Risk Assessment

Business Contingency Planning

Presentation of itmc ltd.

• ITOM

– User Management

– Asset Management

– Help Desk / Service Center, ITIL-3 based.

• Strategic IT Consulting

• IT Outsourcing

Presentation of itmc ltd.

• ITOM

• Strategic IT Consulting

– IT Strategy

– Business Continuity

– Risk Analysis

– IT Security

– Compliance

– Project development

– Landscaping and Documentation

• IT Outsourcing

Presentation of itmc ltd.

• ITOM

• Strategic IT Consulting

• IT Outsourcing

– Project Development

– Project Management

– Everything Sharepoint, SQL, .NET

– Systems development and maintenance

– Application development and maintenance

– Offshoring

IT Operation Management

By job function the user

gets an IT-uniform. The job function and

employee type defines the

IT-privileges

The job function initiate

the hand out of asset

packages and tools. By knowing job function,

privileges, systems and

assets the SC is fully

capable of handling all

needs and urgent

actions, for all parts of

the organization. Hole operation goes from handling

individuals to handling roles and packages.

Operation Management

User Management

AssetManagement

ServiceCenter

Summary

Identity Management - based on strong Role Based Access Control (RBAC)

Provides documentation that can be used for compliance monitoring in accordance with laws or regulatory frameworks

Ensures that users are only provided with approved permissions

Ensures that new users never inherit privileges from previous users based on ‘because that is what they had’

Ensures that all access is automatically removed when users leave their role

Summary

Automation - based on management approval workflows

Automation of approval workflows reduce ‘paper chasing’ and the associated administration and time costs

Approval workflows strengthen security and enforce separation of duties

Automation centralizes user and access management

Approval workflows also ensure approval accountability and audit tracking

Introduction and Objectives

BUSINESS CONTROLUMS enables the company to maintain user access rights from an easy-to-use and easy-to-understand interface, based on users’ job functions (roles).

SECURITY UMS provides a secure structure that enables the organization to maintain a strict policy of providing only need-to-know based access, supported by comprehensive documentation.

COMPLIANCE UMS enables the business to meet regulatory demands of BASEL II, CoBit, SOX (Sarbanes-Oxley), Euro-SOX and other related frameworks. UMS will enable the organization to secure World-Class compliance in relation to user and access management.

FREE UP RESOURCESUMS will transfer the burden of user management from highly skilled IT professionals to administrative personnel, supported by management approval workflows.

Technology

UMS is based on Microsoft Share Point 2007 and thereby benefits from inherent association with various other parts of the Microsoft software family.

UMS communicates seamlessly with Active Directory, MS SQL Server and Oracle databases, SAP, OLE DB, Unix, LDAP based systems and ERP’s in general. UMS control almost every user-access controlled information system.

Key points of UMS

Ease of use Easy to create a new user in only 5 steps. Very flexible handling of all types of employees and

systems Able to deal with external employees and distribution

groups.

Simple to manage UMS automatically rolls down changes to job functions to

all associated users UMS also contains many features such as automatically

removing permissions at the end date of their job functions.

More information

Please visit our website for more information at www.umsolution.net