SOLUTIONS

Identity and Access Managed Services
Identity and Access Managed Services2018-11-21T10:55:54+00:00

IAM Managed Services Introduction

Cloud first initiatives have become the standard across most industries in order for companies to reduce overall operating cost, eliminate or reduce the need for costly data centers, and improve responsiveness to business demands. While this transformation has been underway for a while, the business community has been apprehensive to move security initiatives, particularly IAM solutions to the Cloud until recently.

As this Cloud transformation is taking place, some enterprises still prefer to keep key IAM elements within their data centers, creating a hybrid model. One thing for certain is the business imperative to reduce operating costs and improve service levels is ever increasing. In the IAM space this is becoming particularly challenging due to the cost and availability of IAM professionals, the demand to rapidly add services, the limited availability of Cloud based IAM features/functions, and the associated complexities.

In order to address these challenges, CTI-Global has built an IAM Managed Services offering that will support the following functionality:

  • User Lifecycle Management

  • Identity Governance

  • Multi-factor Authentication

  • Web Access Management

  • Identity Federation

  • Policy Based Access Control

  • Directory Services

  • Privileged Account Management

IAM Solution Partnerships

CTI Global partners with the industry leading IAM solution companies. We also continue to evaluate new technologies to ensure we are in alignment with market trends.

Our current solution partners include:

BeyondTrust is the global leader in Privilege-Centric Security, offering the most seamless and straightforward approach to preventing data breaches related to stolen credentials, hijacked insider accounts, and misused privileges

CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline.

CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline.

Ping Identity’s comprehensive, standards-based platform allows users and devices to securely access all cloud, mobile, SaaS, and on-premises applications and APIs. Designed for hybrid IT environments, it can be deployed on-premises, in the cloud, or both, and provides centralized control to optimize the balance of security and convenience for a wide range of use cases.

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process. Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM. PlainID simplifies Authorization to one point of decision, one point of control and one point of view of every authorization level: in the cloud, mobile and on-premise applications.

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process. Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM. PlainID simplifies Authorization to one point of decision, one point of control and one point of view of every authorization level: in the cloud, mobile and on-premise applications.

Okta is a leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences.

SailPoint is the leading Identity Governance solution. SailPoint’s software integrates role management, access request management, and compliance management solutions that help enterprises to capture control over user access to streamline IT compliance processes and reduce the risks of fraud.

SailPoint is the leading Identity Governance solution. SailPoint’s software integrates role management, access request management, and compliance management solutions that help enterprises to capture control over user access to streamline IT compliance processes and reduce the risks of fraud.

Our partner ecosystem covers all aspects of Identity and Access Management, and while in some scenarios partners have competing solutions, in most cases they complement one another. The delivery method for these companies vary, and in some cases overlap, therefore requires adaptability in the approach to Managed Services.

Software as a Service

In this offering, the vendors generally manage the infrastructure, perform necessary upgrades and monitor the software performance. Typically, these SAAS offerings are multi-tenant, while some vendors are operating in the background as a PAAS (Platform as a Service).

The functionality for these services is typically a subset of the full product functionality as the configurations must be adaptable to meet the requirements of all connected clients, simultaneously. This limits the ability to customize the offerings, which most medium to large businesses require to meet their business demands. The Managed Services opportunity for these offerings are somewhat limited since the vendors are providing a majority of the support functions.

Private Cloud

In this arrangement, clients usually are more concerned around security but still require a cloud-based solution as part of their overall IT strategy. While clients may choose various private cloud vendors, our objective should be to sell CTI Global’s Private Cloud.

In circumstances where clients choose to utilize another private cloud vendor, we would not manage the infrastructure, but would have full responsibility for the solution support. In the optimal cases where the clients are running in our private cloud, we then enjoy the revenue benefits of the total solution, but also have complete responsibility for all aspects of the service including the infrastructure.

Public Cloud

This encompasses services such as AWS, Google or MS Azure and is very similar to the Private Cloud when hosted by someone other than CTI Global. More clients are going in this direction due to the cost benefits and the ability to have an elastic computing model to support peak performance and capacity demands. 

On-Premise

As indicated by the name, the client maintains a data center with the required computing resources to support the chosen solutions. Typically, clients who have very stringent security requirements have not assumed a cloud first initiative, and/or have long term investments in computing infrastructure and therefore will want to operate in this model.

In these circumstances, the client IT team would usually take care of the infrastructure, but are looking to reduce their overall support costs by staff reductions. It should be assumed that at least one, but potentially many CTI global resources would be expected to be on-site full time, while a majority of the support team is located at a CTI Global MS facility.

It should also be expected that clients running in this model would expect higher level security controls on our end. This could include the demand to utilize client imaged desktops/laptops, physically isolated areas for support staff, and in some cases increased screening requirements for associated CTI Global support staff.

Hybrid

A hybrid model consists of a combination of solutions that could be set up in a combination of any of the above services. Many organizations are in a transition to a cloud initiative and may have some of their IAM solutions in the cloud while other solutions may be on-premise.

CTI Global provides Managed Services for all of the above configurations.

Let's Connect

Whether you are looking for general assistance or have a specific project you want to discuss,
we are here to help.
Contact Us