Evidian provides a series of IAM consulting services to help you build your identity and access management project. These services cover three principle domains:
For our E-SSO & Authentication Manager, WAM, IAM and SafeKit products, Evidian offers to implement a POC (Proof of concept)
Prerequisites |
|
Participants |
|
Content |
|
Equipment |
|
The advice and audit group offers to support you with:
We will spend time specifically on considering the organisational and technical aspects of such projects, and the ROI: financial, for users, professionals, IT support teams and of course security teams (implemented from an SMSI, professional regulatory constraints: Bale II/III, Solvency, HIPAA).
With regard to audit, the methodology adopted is the following:
Here are some examples of consulting tasks that can be achieved in Evidian:
Task | Content |
Audit of the existing set-up |
|
Proposing a management model for the organisation's authorisations with Policy Manager |
|
Needs assessment in terms of strong authentication |
|
Evidian offers you support in the design phase of your project using our E-SSO & Authentication Manager, WAM, IAM and SafeKit products.
Here are some examples of tasks that can be achieved in Evidian:
Task | Content |
ESSO technical and functional specifications |
|
WAM technical and functional specifications |
|
IAM technical and functional specifications |
|
A major player in the aeronautical sector, let's call it X, decided to provide shared access for all its branches and divisions. At the same time, X had set up a private cloud to store the access portal and shared services. To facilitate access to these services, X wished to offer a Single Sign-On service to its users, and extend this service to all its divisions.
X wanted to simplify the authentication process for users to access the "cloud", which had to comply with four successive authentications at the time.
We analysed the existing portal
It was a web application installed in the "cloud", federating access to all divisions, and allowing access to the shared resources of the company. The "cloud" contributed to direct access to shared services such as the CRM, intranet applications, HR, etc.
Choosing the right technical solutions
Analysing each scenario
Analysing the costs: in terms of equipment, licences and effort required to implement each scenario
Offering an analysis of the different scenarios: selection criteria, decision matrix, SWOT table
Complete the form on the right of this page, and you will be contacted by one of the technical agents for this implementation.