📜 ⬆️ ⬇️

Principles of successful IDM implementation. Business Cases

The market for information security systems, namely, IDM solutions, according to the latest trends in the West, is growing at an enormous pace. This trend has been observed in the past few years in countries of Eastern Europe and Russia. IDM solutions today are sought after by large and medium-sized businesses ..

image


On the Russian IDM market there are both Western and domestic vendors. The most common IDM systems today are Oracle Identity Manager, IBM Security Identity Manager, Microsoft Forefront Identity Manager, CUB, Avanpost. They have a lot in common, but there are some functional features and when choosing a solution, the customer certainly needs to get to know each of them in order to understand which of the systems most fully meets its requirements. What is IDM? This is an account management system. Usually in IDM there are two ways to provide access: on the basis of personnel changes (job access) and through the self-service web portal (individual access). Entities managed by IDM accounts. IDM creates accounts and manages the membership of pre-configured groups.
image

')
All existing IDM – systems have much broader functionality, and some of them allow you to manage “granular rights”, configure typical access (create groups and link them to resources), and even create new resources.

Until recently, the use of IDM by Russian companies was the prerogative of industry giants, representative offices of western companies and the largest banks. These are companies with a number of thousands of people, a huge "zoo" of information systems, many of which are designed specifically for these companies and are not used anywhere else, and the budget is measured in dozens or even hundreds of millions. Why?

The fact is that the majority of IDM solutions in the Russian market are represented by market leaders, trendsetters, such as Oracle, IBM, Microsoft.

These solutions are designers, they have the ability to customize for any business processes. In fact, Western IDM are platforms. But the cost of licenses of these systems is quite high, and the implementation can last for years. At the same time, if the customer’s business processes change, then the solution should be practically rewritten anew.

Recently, the market situation is changing. Companies with more than 200-500 people want to reduce the risks of illegitimate access to their information resources and use IDM systems to automate the process of providing and controlling access. What has changed?

  1. The competence of integrators, who formed “typical” replicable solutions, increased the competence of their engineers, which led to a reduction in project costs.
  2. Western companies from the big three have changed the price policy, offering significant discounts, reaching up to 70% of the original cost. This is due, among other things, to the emergence of competitors of domestic vendors with significantly more lucrative offers.
  3. The complexity and number of information systems used and the qualifications of Russian company employees are increasing.

But the IDM market in Russia is still not as large as in the West (in the US, 4 out of 5 companies with more than 1,000 people use IDM solutions). What needs to be done to make an IDM class product successful in Russia?

TrustVers company is a domestic developer of IDM-solutions successfully implemented, both in large organizations and in companies of up to 1000 people. We have formed several theses, which, in our opinion, can be the key to the successful implementation of IDM in the Russian company.

1. An IDM implementation project should last an average of 3 months. This can be achieved in several ways:

2. IDM should work in conjunction with other systems that provide information security of the company. Rarely in which companies do IDM start to use from scratch. In the overwhelming majority of cases, the company already uses one of the systems of the class ITSM, SIEM, SSO, PKI, ACS. Let's take a closer look at how you can use the class system Identity Management in conjunction with related solutions.

image


image


image



image


image


3. IDM solution should be advantageous to use. Unfortunately, due to high expectations, lack of corporate ethics of using regulations for creating applications, inexperience of the integrator, the project for the implementation of an IDM solution does not always bring the company the expected effects. How to achieve the maximum effect from the introduction of IDM?

The acquisition of IDM solutions is a crucial step and for successful implementation and subsequent operation of the system it is necessary to thoroughly understand the functional features of various IDMs, select an experienced integrator and conduct training of specialists. The decision on implementation should be taken collectively, with the participation of business, IT service staff and NIB.

Alexey Pavlov, Presale Manager
LLC "TrustVers"
http://trustverse.ru

Source: https://habr.com/ru/post/217667/


All Articles