Connet offers a full spectrum of Identity Management (IDM) provisioning, administration, ongoing maintenance, and real-time monitoring. The process begins with a consulting engagement to define policies and user roles and access permissions, continues with deployment of the most appropriate technology for the customer, and maintains vigilant policy enforcement via ongoing incident detection and response.
The ability to control access to networks, applications and data by users and devices is central to data security, compliance and risk management. While at the same time organizations need to map these requirements to their own business practices, approval structures and internal security classifications.
Provisor is a complete user management and provisioning system that enables organizations to automate and manage all activities associated with adding, maintaining and removing digital identities, credentials and their entitlements. It provides centralized security management of policies and access privileges to critical applications, data and resources across the enterprise, reducing risk and simplifying regulatory compliance through comprehensive audit reporting.
The Internet of Things (IoT) links people, places, things, systems, and information sources into activity streams, deriving value for those interactions and relationships by using the context of combined “identities” (people, devices, and other “objects”), their attributes, and uses.
The top five reasons for revamping an IAM program:
1. Ineffective or inefficient operational approach to managing identities
2. Lack of an end-to-end governance process
3. Constant reactive responses to cyber threats, which lead to inefficient use of resources
4. Imbalance of solution focus between compliance and business enablement
5. Widening skills gap across IT that makes building and maintaining an effective IAM capability increasingly difficult
We offer a wide range of consultation services to help implement enterprise Identity Management (IDM) strategies from start to finish. Connet can help an organization to automate complex user management processes and to achieve:
- Unified and centralized view of all user credentials
- Automatic provisioning/ de-provisioning of users in multiple applications, platforms and network
- Delegated administration
- User Self Service
- Improved enterprise security
- Reduced Help Desk Costs
- Enhanced Productivity
Connet provides end-to-end identity and access management solutions to Enterprises using its unique global solution delivery model.
Directory Services
Directory and messaging technologies are two essential building blocks that allow companies to manage identity and enable communications for millions of customers, suppliers and partners in the Net Economy.
Connet can provide a range of Directory Server solutions dedicated to any of the applicable industry verticals like Finance, Manufacturing, Insurance, Retail, and Telecom etc.
Directories are becoming integral part of any business in the current market scenario. And the services that are mentioned below are targeted towards those customers who use OR are planning to use a Directory server based mechanism which will be the central repository for any services like Authentication, Authorization, User Management, Contact No.’s & Address Management, and a gamut of other useful purposes.
Connet’s directory services include Consultancy, Directory Services Deployment, Directory Migration Services, Directory Security Implementation, Content Monitoring & Sustenance Service, Directory Server Sizing & Replication Strategy Planning, and Application Integration.
Role Engineering
Enterprises always have a challenge to manage and audit user access to IT systems. With millions of access rights, this has been very difficult, especially during periods of expanding IT system portfolio or restructuring organization hierarchy. As a result, organizations experience the following problems:
Difficult to audit for “who has access to what?”
Redundant privileges which are cause of threat
Difficult to manage many privileges for a user, on a variety of systems and platforms
More time to provide accurate access to legitimate users
Most enterprises today adapt Role-based Access Control (RBAC) - the management of IT privileges in accordance to business roles -- as best practice and as a solution to the privileges quality and control issues. In a role-based environment, 500 roles may replace a million individual access rights, making it easier to manage and maintain. Furthermore, roles correspond to business practices, and as such enhance collaboration between business and IT.
Wipro has extensive experience in role engineering whereby optimum role model can be defined for an organization. Wipro’s solution proposition not only helps in defining the roles but also help organization in effectively managing life cycle of a user ‘role’.
Full Role Management lifecycle solution
Collaborative environment for IT and business managers
Overall view of privileges across systems and organization
Quick and effective Role definition (days instead of months)
Automatic assessment and auditing for access right exceptions
Policy compliance Verification (before and after provisioning)
Versatile business and administration processes
Enterprise Single sign-on (SSO)
Through Single sign-on (SSO) a single action of user authentication and authorization can permit a user to access all domains where (s)he has access permission, without the need to enter password multiple times.
Enterprise secure single sign-on (E-SSO) is a key component of successful enterprise identity and access management solution. Connet’s E-SSO solution offering provides a standards-based, secure approach for user to sign-on to multiple web and non web systems by eliminating the need for multiple password challenge and user input. E-SSO provides several essential criteria for both secure access and meeting compliance regulations.
Connet’s offering provides cross domain Single Sign On and Global Single Sign On solution for non web based applications such as ERP and CRM etc. This enables users to seamlessly and securely move across different sites of the organization and its partners.
Connet has 4 step approach for Global Single Sign On:
Design an enterprise wide user store to enable a single consolidated view of all internal and external users across the organization. Define the deployment architecture of the solution framework.
Enable the systems to participate in a single sign-on framework by synchronizing the User ID and passwords across multiple applications including web and Legacy/Packaged.
Implement Single Sign-on across web applications using a Single Sign-on product such as CA, IBM, Sun, Oracle eSSO and Passlogix etc.
Extend the Single Sign-on product using the interfaces it provides. Define a Global Single Sign-on module using these interfaces to extend the single sign-on to multiple applications including packaged/web, custom developed or legacy applications.
User Provisioning
According to a recent survey by a leading research group up to 40% of the help desk call volume can be attributed to password management requests from end users. A call to the help desk to reset a password can cost up to $40 per call. Large enterprises are spending millions of dollars on this per year. A solution that eliminates password-related calls can result in significant savings. This is one of the most visible benefits of a Global Identity and Access Management solution.
The adoption of enterprise identity management is fast becoming an imperative for success in an organization’s security initiatives. Connet helps organizations to automate complex user management processes and to achieve:
- Unified and centralized view of all user credentials
- Automatic provisioning/ de-provisioning of users in multiple applications, platforms and network
- Delegated administration
- User Self Service
- Reduced Help Desk Costs
- Improved Regulatory Compliance
Web Access Management
Connet offers a unified model of security system that can address the basic issues of authentication, access control, security event logging, encryption / decryption and Single Sign On for all web applications. The centralized security allows administrators to manage large number of users, user privileges and entitlements across multiple applications and platforms in uniform and consistent manner.
The Role Based Access Control (RBAC) model grants access to users based on the roles associated with them as a set of primary roles and secondary roles. The RBAC model controls access statically and dynamically by regulating user actions through the establishment and definition of roles, role hierarchies and role constraints.