ca Securecenter 
Identity As A Service Evaluation, 
Implementation, Realized Benefits 
Drew Koenig 
SCT10S @binaryblogger #CAWorld 
Manager of Information Security & Risk Management 
Univita Health
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
How to evaluate IAM offerings and the trade- off between the customization level available on-premises, and the speed/cost model benefits of SaaS. How CA Secure Cloud (formerly CA CloudMinder™) can efficiently enable the business with faster implementation times, improved compliance and a reduction in infrastructure and support costs. 
Drew Koenig 
Univita Health 
Manager of Information Security & Risk Management 
@BinaryBlogger 
Binaryblogger.com
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Agenda 
INTRO 
IDENTITY MANAGEMENT BACKGROUND 
Q&A 
THE MOVE TO THE CLOUD 
JUSTIFICATION –COSTS AND TIME 
REALIZED BENEFITS 
1 
2 
3 
4 
5 
6
4 
© 2014 CA. ALL RIGHTS RESERVED. 
Introduction 
Information security professional for over 15 years 
–Financial and health industry 
–Focused on IAM for a majority of the career 
Made the move from on-premises IdMto the cloud 
–CA Identity Manager to CA Secure Cloud 
–Primary reason was speed of enablement and overall cost value 
Drew Koenig –Manager of Information Security and Risk Management
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Background 
On-premises for 2 years, hand built from the ground up. 
–Windows based, SQL DBs 
–Out-of-the-box CA Identity Manager installation (JBOSS, CA Directory, etc…) 
–Dev and prod, internally accessible only, no CA Single Sign-On 
The team was only 1 to 1 ½ FTE to maintain and advance it 
The expanding business use became time consuming 
On-premises Environment 
CA Identity Manager 12.6 SP2 on-premise
6 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Background 
Self-service password reset 
–Limited to internal access only, need for internet capability 
Service Desk features for resets, unlocks and other account maintenance features 
Basic account provisioning with heavy custom flows and processes 
On-premises Environment 
CA Identity Manager 12.6 SP2 on-premise
7 
© 2014 CA. ALL RIGHTS RESERVED. 
The Move To The Cloud 
Participated in the early alpha tests of CA Secure Cloud 
Accomplished more in 1 week than 3 months on-premises start to finish 
–Build, configuration, test 
Made the strategic decision to move 
Alpha to Production 
CA Secure Cloud (formerly know as CA CloudMinder™)
8 
© 2014 CA. ALL RIGHTS RESERVED. 
The Move To The Cloud 
The early proposal was declined immediately 
Initially management only looked at the license costs vs. subscription costs, ignored the proposed value 
The business looked at IAM as a technology project, not as business enablement 
Initial Proposal 
CA Secure Cloud 
X
9 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
Went back and broke down the full set of CA Secure Cloud services 
Laid out exactly what the subscription delivered 
Built a cost model to show a comparable on-premises build out 
Expanded internally with HR and Compliance to gain support 
True Business Value, Look At Everything 
IAM
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Management Components 
IdentityManagement Stack 
Directory Services 
Provisioning Engine 
Workflows 
Identity and Role Admin 
Identity Verification 
Authentication/Authorization/ Federation 
IT Platform 
Databases 
OperatingSystems / Virtualization 
Storage 
Networking 
Hardware 
HA / DR 
Consumable Identity Service 
ServiceInterfaces 
Customer SpecificConfigurations 
Customizations 
To do a legitimate comparison, I laid out the costs to build an on-premises environment that could provide the same set of services that we would receive from CA Secure Cloud
11 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
–CA Identity Manager 
–CA Single Sign-On 
–CA Federation 
–CA Advanced Authentication 
–Microsoft Windows, SQL 
–NetAppStorage, VMWare, HP 
The Cost To Build Secure Cloud Capabilities On-Premises 
Required Components
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Justification 
Build three environments 
–Preview, Staging, Production 
–Approx. 5 servers per environment 
Patching, troubleshooting, maintenance 
–Java, Microsoft, CA, backups 
All outages, issues, problem resolution are yours to solve 
–Even with vendor assistance 
Infrastructure 
Footprint 
Preview 
Staging 
Production
13 
© 2014 CA. ALL RIGHTS RESERVED. 
IDaaSAllows Full Focus On IdM 
IdentityManagement StackDirectory ServicesProvisioning Engine 
Workflows 
Identity and Role Admin 
Identity VerificationAuthentication/Authorization/Federation 
IT Platform 
Databases 
OperatingSystems / Virtualization 
Storage 
Networking 
Hardware 
HA / DR 
Consumable Identity Service 
ServiceInterfaces 
Customer SpecificConfigurations 
Customizations 
•Eliminated busy work and trouble shooting 
•Allowed the Identity Management team to focus on Identity Management
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Decision to Move 
Total cost to build was less than pure license vs. subscription 
Maintenance was a fraction of previous cost 
–Patching alone saved 20-40 company man-hours a month 
Complete justification model made it an easy business decision 
This approach is now used for all cloud service evaluations 
–Cloud service or ‘build it ourselves’ total cost assessment 
Value Prevailed Over Cost 
Components
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Instant Benefits 
Within hours of the service being enabled we were online 
Small JCS server to hook into AD for resets took less than an hour 
One “Explore and Correlate” and all the users were in Secure Cloud and we were resetting passwords through internet 
Off and Running 
Days not months
16 
© 2014 CA. ALL RIGHTS RESERVED. 
Instant Benefits 
Unique application model required B2B users deep account access 
Until CA Secure Cloud the only way they could manage accounts was to call the Service Desk –hundreds a month 
Now they go to CA Secure Cloud -calls reduced 80 percent in days for B2B calls 
Off and Running 
Days not months
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Summary 
Improvements In All Areas 
Overall the move to CA Secure Cloud will save the company money in time, resources and speed to deliver new identity management services to our employees and customers. There is no pressing need to grow the internal team as the capabilities grow. Through the CA Secure Cloud services we have closed several audit findings, strengthened partnership confidence and are able to focus more on improving advanced offerings such as deeper role based provisioning, federation portal capabilities and reporting. 
The success of the move was not to look at the costs alone but the total value of what those costs brought in terms of services, then compare those to what it would take to do it yourself.
18 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
19 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation

More Related Content

PDF
CA Identity Suite – Extending Identity Management to the Business User
PDF
Simplified Identity Management and Governance from One UI — The CA Identity S...
PDF
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
PDF
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
PDF
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
PDF
Developing Secure Mobile Applications
PDF
Protecting the Software-Defined Data Center from Data Breach
PDF
Enable and Secure Business Growth in the New Application Economy
CA Identity Suite – Extending Identity Management to the Business User
Simplified Identity Management and Governance from One UI — The CA Identity S...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Developing Secure Mobile Applications
Protecting the Software-Defined Data Center from Data Breach
Enable and Secure Business Growth in the New Application Economy

What's hot (20)

PDF
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
PPTX
Salesforce Security Review Tips and Tricks
PDF
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
PDF
OAuth in the Real World featuring Webshell
PDF
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
Complicate, detect, respond: stopping cyber attacks with identity analytics
PDF
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
PDF
The API Opportunity: Crossing the Digital Divide
PPT
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
PDF
Single Sign-On and User Provisioning with Salesforce Identity
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
PDF
SAP Identity Management Overview
PDF
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
PPTX
Camunda BPM - Said Mengi
PDF
Freeing the World from Slow: How Service Virtualization and the Concept of S....
PDF
Enable Secure Mobile & Web Access to Microsoft SharePoint
PDF
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Salesforce Security Review Tips and Tricks
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
OAuth in the Real World featuring Webshell
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Adapting to Digital Change: Use APIs to Delight Customers & Win
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Complicate, detect, respond: stopping cyber attacks with identity analytics
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
The API Opportunity: Crossing the Digital Divide
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Single Sign-On and User Provisioning with Salesforce Identity
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
SAP Identity Management Overview
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Camunda BPM - Said Mengi
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Enable Secure Mobile & Web Access to Microsoft SharePoint
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Ad

Viewers also liked (12)

PDF
Introduction to Identity-as-a-Service and Secure Access to SaaS
DOCX
Vineet_Resume_Tech
PDF
Achieving a Successful Identity Management and Governance Deployment The Flor...
DOC
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
PDF
Windows Host Access Management with CA Access Control
PDF
How to Leverage New Capabilities in the CA Identity Suite
PDF
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
PDF
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
PDF
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
DOC
Prakhar Sood-Resume-CV
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Identity and Access Management 101
Introduction to Identity-as-a-Service and Secure Access to SaaS
Vineet_Resume_Tech
Achieving a Successful Identity Management and Governance Deployment The Flor...
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Windows Host Access Management with CA Access Control
How to Leverage New Capabilities in the CA Identity Suite
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Prakhar Sood-Resume-CV
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Identity and Access Management 101
Ad

Similar to Identity As A Service Evaluation, Implementation, Realized Benefits (20)

PPTX
CA CloudMinder Vasu Surabhi
PPTX
The Future of Enterprise Identity Management
PDF
Iam cloud security_vision_wp_236732
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
Putting Security in Identity-as-a-Service
PDF
Trusted Cloud Initiative: Identity Management Research
PPTX
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
DOCX
Directions Answer each question individual and respond with full .docx
PDF
Mt26 identity management as a service
PPTX
Exploring Cloud Commons
PDF
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
DOCX
School of Computer & Information SciencesITS-532 Cloud C.docx
PDF
Identity as a Service: a missing gap for moving enterprise applications in In...
PDF
Identity-As-A-Service (IDaaS) – Everything You Need To Know
PDF
CA Security - Deloitte IAM Summit - Vasu
PDF
CIS14: Lean In: Enterprise Cloud Identity
PDF
Security - A Digital Transformation Enabler
PDF
IAM Cloud Datasheet plus Cloud Drive Mapper
PDF
Manpower group idm-platform
PPTX
Building & Running A Successful Identity Program
CA CloudMinder Vasu Surabhi
The Future of Enterprise Identity Management
Iam cloud security_vision_wp_236732
Emerging Managed Services Opportunities in Identity and Access Management
Putting Security in Identity-as-a-Service
Trusted Cloud Initiative: Identity Management Research
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Directions Answer each question individual and respond with full .docx
Mt26 identity management as a service
Exploring Cloud Commons
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
School of Computer & Information SciencesITS-532 Cloud C.docx
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity-As-A-Service (IDaaS) – Everything You Need To Know
CA Security - Deloitte IAM Summit - Vasu
CIS14: Lean In: Enterprise Cloud Identity
Security - A Digital Transformation Enabler
IAM Cloud Datasheet plus Cloud Drive Mapper
Manpower group idm-platform
Building & Running A Successful Identity Program

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
How Components Increase Speed and Risk
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
How Components Increase Speed and Risk

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Chapter 5: Probability Theory and Statistics
PDF
STKI Israel Market Study 2025 version august
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Architecture types and enterprise applications.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
DOCX
search engine optimization ppt fir known well about this
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
The various Industrial Revolutions .pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
CloudStack 4.21: First Look Webinar slides
PPT
What is a Computer? Input Devices /output devices
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
Modernising the Digital Integration Hub
2018-HIPAA-Renewal-Training for executives
Chapter 5: Probability Theory and Statistics
STKI Israel Market Study 2025 version august
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
NewMind AI Weekly Chronicles – August ’25 Week III
Architecture types and enterprise applications.pdf
Zenith AI: Advanced Artificial Intelligence
search engine optimization ppt fir known well about this
Comparative analysis of machine learning models for fake news detection in so...
Convolutional neural network based encoder-decoder for efficient real-time ob...
The various Industrial Revolutions .pptx
1 - Historical Antecedents, Social Consideration.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The influence of sentiment analysis in enhancing early warning system model f...
A proposed approach for plagiarism detection in Myanmar Unicode text
Taming the Chaos: How to Turn Unstructured Data into Decisions
CloudStack 4.21: First Look Webinar slides
What is a Computer? Input Devices /output devices
Custom Battery Pack Design Considerations for Performance and Safety

Identity As A Service Evaluation, Implementation, Realized Benefits

  • 1. ca Securecenter Identity As A Service Evaluation, Implementation, Realized Benefits Drew Koenig SCT10S @binaryblogger #CAWorld Manager of Information Security & Risk Management Univita Health
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract How to evaluate IAM offerings and the trade- off between the customization level available on-premises, and the speed/cost model benefits of SaaS. How CA Secure Cloud (formerly CA CloudMinder™) can efficiently enable the business with faster implementation times, improved compliance and a reduction in infrastructure and support costs. Drew Koenig Univita Health Manager of Information Security & Risk Management @BinaryBlogger Binaryblogger.com
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Agenda INTRO IDENTITY MANAGEMENT BACKGROUND Q&A THE MOVE TO THE CLOUD JUSTIFICATION –COSTS AND TIME REALIZED BENEFITS 1 2 3 4 5 6
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. Introduction Information security professional for over 15 years –Financial and health industry –Focused on IAM for a majority of the career Made the move from on-premises IdMto the cloud –CA Identity Manager to CA Secure Cloud –Primary reason was speed of enablement and overall cost value Drew Koenig –Manager of Information Security and Risk Management
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Background On-premises for 2 years, hand built from the ground up. –Windows based, SQL DBs –Out-of-the-box CA Identity Manager installation (JBOSS, CA Directory, etc…) –Dev and prod, internally accessible only, no CA Single Sign-On The team was only 1 to 1 ½ FTE to maintain and advance it The expanding business use became time consuming On-premises Environment CA Identity Manager 12.6 SP2 on-premise
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Background Self-service password reset –Limited to internal access only, need for internet capability Service Desk features for resets, unlocks and other account maintenance features Basic account provisioning with heavy custom flows and processes On-premises Environment CA Identity Manager 12.6 SP2 on-premise
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. The Move To The Cloud Participated in the early alpha tests of CA Secure Cloud Accomplished more in 1 week than 3 months on-premises start to finish –Build, configuration, test Made the strategic decision to move Alpha to Production CA Secure Cloud (formerly know as CA CloudMinder™)
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. The Move To The Cloud The early proposal was declined immediately Initially management only looked at the license costs vs. subscription costs, ignored the proposed value The business looked at IAM as a technology project, not as business enablement Initial Proposal CA Secure Cloud X
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. Justification Went back and broke down the full set of CA Secure Cloud services Laid out exactly what the subscription delivered Built a cost model to show a comparable on-premises build out Expanded internally with HR and Compliance to gain support True Business Value, Look At Everything IAM
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Identity Management Components IdentityManagement Stack Directory Services Provisioning Engine Workflows Identity and Role Admin Identity Verification Authentication/Authorization/ Federation IT Platform Databases OperatingSystems / Virtualization Storage Networking Hardware HA / DR Consumable Identity Service ServiceInterfaces Customer SpecificConfigurations Customizations To do a legitimate comparison, I laid out the costs to build an on-premises environment that could provide the same set of services that we would receive from CA Secure Cloud
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. Justification –CA Identity Manager –CA Single Sign-On –CA Federation –CA Advanced Authentication –Microsoft Windows, SQL –NetAppStorage, VMWare, HP The Cost To Build Secure Cloud Capabilities On-Premises Required Components
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Justification Build three environments –Preview, Staging, Production –Approx. 5 servers per environment Patching, troubleshooting, maintenance –Java, Microsoft, CA, backups All outages, issues, problem resolution are yours to solve –Even with vendor assistance Infrastructure Footprint Preview Staging Production
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. IDaaSAllows Full Focus On IdM IdentityManagement StackDirectory ServicesProvisioning Engine Workflows Identity and Role Admin Identity VerificationAuthentication/Authorization/Federation IT Platform Databases OperatingSystems / Virtualization Storage Networking Hardware HA / DR Consumable Identity Service ServiceInterfaces Customer SpecificConfigurations Customizations •Eliminated busy work and trouble shooting •Allowed the Identity Management team to focus on Identity Management
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Decision to Move Total cost to build was less than pure license vs. subscription Maintenance was a fraction of previous cost –Patching alone saved 20-40 company man-hours a month Complete justification model made it an easy business decision This approach is now used for all cloud service evaluations –Cloud service or ‘build it ourselves’ total cost assessment Value Prevailed Over Cost Components
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. Instant Benefits Within hours of the service being enabled we were online Small JCS server to hook into AD for resets took less than an hour One “Explore and Correlate” and all the users were in Secure Cloud and we were resetting passwords through internet Off and Running Days not months
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. Instant Benefits Unique application model required B2B users deep account access Until CA Secure Cloud the only way they could manage accounts was to call the Service Desk –hundreds a month Now they go to CA Secure Cloud -calls reduced 80 percent in days for B2B calls Off and Running Days not months
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Summary Improvements In All Areas Overall the move to CA Secure Cloud will save the company money in time, resources and speed to deliver new identity management services to our employees and customers. There is no pressing need to grow the internal team as the capabilities grow. Through the CA Secure Cloud services we have closed several audit findings, strengthened partnership confidence and are able to focus more on improving advanced offerings such as deeper role based provisioning, federation portal capabilities and reporting. The success of the move was not to look at the costs alone but the total value of what those costs brought in terms of services, then compare those to what it would take to do it yourself.
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation