CA Enterprise Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

SECURING INDUSTRY

IN THE CONNECTED
WORLD
Tech Mahindra Enterprise Security Practice
The IAM solution improves risk and compliance, enhances customer
experience and increases the agility of the application estate of the
KEY BUSINESS DRIVERS
organization. Implementing the IAM solution in legacy organizations
involves a fair share of risks in consolidating identity data and
implementing it on key production systems. Slow login times, service  Security Efficiency
outages or inability to rollout the identity platform across the  Containing Cost
application estate can affect the return on investment and hence the  Improving SLA
business itself.
 Security Effectiveness
Tech Mahindra is an experienced IAM system integrator with  Risk Management
experience in deploying such IAM solutions for some of the largest  Compliance to
and most demanding customers across the world. We have devised
Regulations
solutions that scale, methodologies that facilitate rollouts in complex
estates and out-of-the-box components for quicker implementations.
Our goal is to help reduce implementation risks and advice our clients  Business Enablement
on the best method to implement and support the IAM program.  Cloud Based Services

The IAM solution as a suite, is comprised of several different solutions


bound together across the identity lifecyle of users and their
authentication requirements. It also covers interactions with partner
systems, cloud applications and devices. Our services cover the entire
IAM solution framework as depicted below:
Customer Enterprise Users

Consumers Partners IT Staff Employees Contractors

Security Governance
Identity Management Framework Access Management Framework
Segregation of Duties
Identity Identity Entitlements Web Access Enterprise Federated Role Engineering
Administration Synchronisation Managements Managements SSO SSO
SaaS
PaaS

Information Rights
Profile Credential Workflow Multifactor OS Access Privilege User Management
Management Management Managements Authentication Control Management
Notification
Hypervisor Access Control & Security Management
Identity Auditing and Access Governance SIEM

IT Resources

Custom ERP CRM


Web Based Client Server Based Operation Directories /
Cloud Apps Mobile Apps
Systems Databases

OUR DIFFERENTIATORS BUSINESS BENEFITS REALIZED BY YOUR


 Expertise in all major IAM functionalities – CUSTOMERS
Identity management, role management,  Enriched user experience while using multiple online services
access management, SSO, federation, across channels
directory technology, privilege user  Increased employee productivity via the ease of on-boarding
management new applications, while addressing activation and retail fraud
 Expertise in all leading IAM products  Enabled “Access Anywhere” using various channels
 E2E IAM services offered – Consulting, Design,  Eliminated misuse of shared passwords and transparent yet
and Implementation secure access was ensured to core network elements
 Extensive experience across various industry  Prevented denial of service, fraud and operation risks by
domains viz. Telecom, BFSI, Government, disgruntled users or hackers who gained privileged access
Healthcare, education etc.  Reduced administrative cost with an improved, yet secure
 Multi-product IAM lab, Cross platform CoEs provisioning process and seamless access to applications
 Proven Methodology - Envision, Enlighten,  Secured high value transactions by risk profiling of retail users
Transform, Maintain  Curbed insider threats due to privileged account monitoring
 Partnerships with leading IAM Vendors
Tech Mahindra Security propositions with CA Technologies Security Products

Our Customer Success

Organizations have
benefited from an
effective reduction in
operational costs,
better control over the
identity lifecycle, fewer
audit issues, faster
product deployments,
and enhanced ustomer
and employee
experience.
Mahindra Security Service Portfolio
Highlights
 13 years in information Security
Services, with projects executed in
25 countries
 450+ security professionals with
relevant certifications
 Consulting, SI, Managed Operations
and Professional Services supported
by investments in Security Operation
Centers, Ethical Hack Labs and
Mahindra Security Services is a leading information security
Research Centers
services provider to enterprises and telcos worldwide. We provide
 Close relationships with product
end-to-end Information security solutions designed to mitigate
vendors to create customized
external and internal risks, ensuring cyber-resilience in a world
solutions
increasingly becoming more open with Cloud and
 Part of Special Interest Groups for
consumerization. Our service offerings across Consulting
IPV6 Security and Critical National
Services, System Integration, Security Testing and Security
Infrastructure
Operations are offered in a variety of commercial models
 7 patents in Network Security
designed to maximize value for our customers across the security
lifecycle.

ABOUT TECH MAHINDRA: ABOUT CA TECHNOLOGIES:

Tech Mahindra is a specialist in digital transformation, CA Technologies (NASDAQ: CA)


consulting and business re-engineering solutions. We provides IT management solutions that
are a USD 3.4 billion company with 95,300+ help customers manage and secure
professionals across 51 countries. We provide complex IT environments to support
services to 649 global customers including Fortune agile business services. Organizations
500 companies. Our innovative platforms and reusable leverage CA Technologies software and
assets connect across a number of technologies to SaaS solutions to accelerate innovation,
deliver tangible business value to all our stakeholders. transform infrastructure and secure data
Tech Mahindra is also amongst the Fab 50 companies and identities, from the data centre to
in Asia as per the Forbes 2014 List. the cloud.

We are part of the USD 16.5 billion Mahindra Group Learn more about CA Technologies at
that employs more than 180,000 people in over 100 www.ca.com
countries. Mahindra operates in the key industries that
drive economic growth, enjoying a leadership position
in tractors, utility vehicles, information technology,
financial services and vacation ownership.

Connect with us on www.techmahindra.com

For more information; write to [email protected] or


[email protected] or visit www.techmahindra.com
Case Study- Identity Access Management
Tier 1 Telco in UK contd 1/1

Business Driver Tech M Approach


 Design, Integration & Support
 A complex environment existed due services for
to the mix of new and legacy systems
 A reusable authentication capability
 The customer had various regulatory for staff, customers and suppliers is
compliance requirements developed using Identity & Access
 100% service uptime requirement for Management solution. This
critical client facing applications centralized authentication
infrastructure is used by key
 The customer saw a Spike/Dip in
external and internal Web
demand due to changing business
applications, performing 36 million
requirement
transactions per day.
 Lack of clear roadmap about the
 Service delivery covering L2
various security aspects.
support
 Service Window – 24 x 7 x 365
 Incident, Problem, Change,
Release and Configuration
Business Challenges and management
 Back to back SLA compliance
Needs  Vendor Management
 Integration, Design & Support service  Supporting one of the complex
for 21C Authentication common SiteMinder infrastructure
capability. performing 36 million transactions
 Supporting one the complex per day
SiteMinder infrastructure  350+ Site Minder implementations
 Migrating hundreds of applications  30+ Federations
supporting 18 million consumers, 170
 800+ agent install/upgrade
K employees behind SiteMinder
protection Stringent SLA challenges  24*7*365 P1 & P2 support
with financial penalty  100% service uptime and SLA
compliance
Case Study- Identity Access
Management
Tier 1 Telco in UK Contd 2/2
Business Benefits
SCOPE OF
 End to End Accountability through
service based SLAs WORK
 Quick and seamless integration of
SiteMinder and Federation services
 Cost Effective Operation driven
through synergies and economies of
scale
 Completely flexible resourcing
model, allowing for both scalability of
services & economy of utilization
during lean periods
 Aligning with BT’s Right First Time
initiative
 Excellent designers delivering
technically and commercially
feasible solutions
 Un-interrupted service and almost
100% service uptime
 Supported BT in decreasing cost
and increasing competitive
advantage. Till July 2009, BT had
saved more than £18 Million by
Enabling Simplified Sign-On Using
Value
CA IdentityDelivered
and Access
Management.
 Apart from SiteMinder & Federation
 Creation and maintenance of
Integration, team also adds VALUE
SiteMinder stats / dashboards /
by active engagement in below
SharePoint updates
areas:
 Supported crucial engagements
 Custom scripts for policy server
like Virtualization Programme
monitoring, utilization, error tracking,
(Hardware migration) and
proactive fault monitoring
Integrated Windows
 New process creation / review to
Authentication (IWA)
implementing best practices
 E2E Workstack Management
Case Study: Identity and Access
Management
An American multinational financial
services corporation

Business Driver Tech M Approach


 The customer was looking for a TechM is delivering 2 tracks, namely
partner to provide design, Information Security Operations -
development and support services Access Management - Help Desk
for their worldwide IAM Level 1 & 2 and Design and
infrastructure. Information Security Engineering -
Build Solutions.
 The first program is being
delivered using completely
Value Delivered Managed Services model to
extend flexibility and agility of
 In the long run we expect to
TechM’s security service to the
improve operations efficiency,
customer.
reduced incidents volumes and
handling times, Improve customer  The transition, Implementation
satisfaction and improve Security and operations are undertaken
posture by reducing SOD violations using TechM’s proven ITIL
and close audit recommendations based framework and we are
quickly, at reduced costs supporting back to back end
customer SLAs and assisting
 Our onsite-offshore based team to
product vendor management
provide distributed software
delivery services in a fully Managed  The second program is being
Services Model delivered with TechM being
partner by joining the Client’s
Security Engineering team to
deliver the required
functionality.

This is 3 year program and being


delivered using onsite – offshore
model at St.Louise, USA and
Hyderabad, India

You might also like