1 / 8

Identity and Access Management Capability Model

Identity and Access Management Capability Model is a comprehensive set of IDAM capabilities, that enterprises can customize to their needs. Visit: https://www.finantrix.com/product/identity-and-access-management-capability-model/<br>

finantrix
Download Presentation

Identity and Access Management Capability Model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity and Access Management Capabilities Model https://www.finantrix.com/product/identity-and-access-management-capability-model/

  2. Identity in the digital age is a strategic technology enabler. Transforming the IDAM function is a top priority for CIOs given the cybercrimes.

  3. Bridge the Strategy to Execution Gap. Business Capabilities are a Structural Blueprint of an enterprise. They capture the Essence of What a Business Function Does and Can Do.

  4. IdAM Capabilities model Level 1 1. IDAM Strategy and Planning 8. Identity Threat Analytics 2. Identity and Access Lifecycle Management 7. Identity Governance IDAM Capabilities Model 6. Privileged Access Management (PAM) 3. IDAM Administration 4. Technology and Infrastructure 5. Reporting and Analytics 4

  5. IDAM CAPABILITIES MODEL LEVEL 1 AND 2 LEVEL 1 AND 2 1. IDAM Strategy and Planning 4. Technology and Infrastructure Identity Directory Integration and APIs IDAM Strategy IDAM Policy Development Self Service Tools Orchestration Engine Risk Management Compliance Governance 5. Reporting and Analytics 2. Identity and Access Lifecycle Management Data Mining and Insights Generation Operational Reporting Access Control Authentication Authorization Credential Management Nested Visualization of two levels. Risk Reporting Management Reporting Zero Trust 6. Privileged Access Management (PAM) Federated Authentication Decomposition to third level is included for additional granularity. (Levels beyond two are not shown here.) Session Management Privileged Account Discovery Privileged Access Monitoring Multi-factor Authentication Cross Channel Authentication Privileged Credential Management 3. IDAM Administration 7. Identity Governance User Administration Access and Provisioning Identity Certification Separation of Duties Role Management Fraud Prevention Management 8. Identity Threat Analytics Authentication Methods Configuration and Set up Anomaly Detection Predictive Analytics 5

  6. Value of Business Capabilities: •Foster alignment between business and IT. •A Capability-anchored Transformation Roadmap eliminates redundancy and focuses on capability evolution •Juxtaposing capabilities and systems/applications provide a footprint analysis for optimization. •And so much more.

  7. Business Capabilities Map Snapshot: • About 145 Capabilities decomposed into three levels. • Capability Definitions • KPIs aligned to Capabilities. • Editable PowerPoint, Excel, and Word Formats. And bonus files.

  8. TO PURCHASE THE CAPABILITY MAP VISIT: https://www.finantrix.com/product/identit y-and-access-management-capability- model/ 20XX PRESENTATION TITLE 8

More Related