|By Business Wire||
|June 23, 2014 09:30 AM EDT||
Dell announces the recent selection of Dell One Identity Manager by Trillium Health Partners and Dell itself to address the challenges presented by today’s constantly shifting user access landscape, which includes the need to control access to a moving target of applications and data, and to provide access to everything from everywhere, without sacrificing security. This move marks the renewed emphasis by organizations to enable appropriate access, while eliminating the risk of employees having more access than they need to do their jobs. Employees with too much access can become internal threats, which are the most prominent threats in the security landscape today.
Although organizations increasingly find that inappropriate access by end users, partners, and administrators is one of the vulnerabilities putting them at greatest risk, they also must adhere to compliance regulations without sacrificing users’ ability to get to what they need, when they need it. The choice of Dell One Identity Manager signals a focused move to stay ahead of these evolving requirements.
With Dell One Identity Manager, organizations have a modular, integrated and affordable way to establish, execute, audit, and control access, no matter what needs to be accessed, who is accessing, how, or from where. While improving security, the solution also boosts business agility by enabling the organization to assign permissions faster — to the right people — increasing productivity and achieving compliance faster, and with less cost and effort.
Simplifying Global Identity and Access Management
Dell’s deployment of its Identity Manager solution has provided significant value to the company, increasing compliance and operational efficiency across its global network. The challenge of appropriately granting and tracking the access privileges and permissions on the corporate network for Dell’s 150,000 employees, consultants and contractors worldwide was due to an ongoing process of employee and consultant onboarding, as the organization looked to grow its salesforce and acquired new companies.
With the deployment of Dell One Identity Manager, Dell has grown from its original identity and access management (IAM) solution, and now can rely on a global, intelligence-driven IAM platform that ties identities, permissions and roles to business rules. The company can track and report on rights, activities and policies in real time using the solution’s access management and reporting tools. The Identity Manager platform also has helped Dell save time by improving self-service and workflow, placing important tasks, approvals, and reports in the hands of line-of-business personnel rather than IT.
John Milburn, executive director, Identity and Access Management, Dell Software
“Dell understands that IAM needs continue to change with new threat landscape and governance needs, and for that reason, we continue to add capabilities to our Identity Manager solution so our customers can stay ahead of the next threat. Dell places a high priority on leveraging its own IP to create more secure, agile and productive work environments for its employees. We’re pleased to provide such a valuable contribution to protecting and better serving not only our own employees, but also our customers, who use it to secure their clients, patients and partners.”
Alan Daines, Chief Information Security Officer, Dell
“With a team of more than 150,000 employees, consultants and contractors worldwide, it was critical that we focus on providing a secure environment that did not stand in the way of people doing their jobs, and also could evolve with business needs. We needed a sound IAM solution that would address our large-scale needs, and still be flexible enough to grow with our business. Dell One Identity Manager uniquely fits the bill both now, and where Dell is heading in the future. This deployment puts us in a much better position to evolve with market movements and create opportunities for company growth.”
Iain Paterson, Information Security Officer, Trillium Health Partners
“Improving security in a healthcare setting is a journey, and, at Trillium, we’ve begun the journey by addressing our access challenges. It has always been difficult to efficiently manage and provide appropriate privileges for our complex and diverse user base, but, with Dell One Identity Manager, we’ve transformed business processes while addressing this core problem. We’ve reduced our risk profile and improved the IT/business relationship with faster provisioning of users, simplified roles and privileges, and attestation, and we intend to leverage even more of Dell One Identity Manager’s functionality as we continue on our security journey.”
- Dell on Dell deployment case study: http://www.dell.com/learn/us/en/uscorp1/corporate~case-studies~en/Documents~2014-dell-identity-10013323-global-access-management.pdf
- Twitter: http://www.twitter.com/dellsoftware
- Facebook: http://www.facebook.com/dellsoftware
- LinkedIn: http://www.linkedin.com/groups/Dell-Software-4793472
- Dell Software YouTube: www.youtube.com/user/DellSoftwareVideo
Delivering Complete and Connected Software Solutions
Dell Software empowers companies of all sizes to experience Dell’s “Power to Do More” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Tweet This: Dell One Identity Manager Safeguards, Empowers Orgs by Granting Appropriate Access http://dell.to/1noqx2G
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 08:00 PM EDT Reads: 1,072
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 08:00 PM EDT Reads: 158
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 08:00 PM EDT
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 08:00 PM EDT Reads: 225
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 07:30 PM EDT Reads: 168
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 07:30 PM EDT Reads: 214
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 07:30 PM EDT Reads: 244
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 07:15 PM EDT Reads: 192
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 8, 2015 07:15 PM EDT Reads: 134
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 07:15 PM EDT Reads: 230
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 07:15 PM EDT Reads: 256
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 07:00 PM EDT Reads: 180
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 06:45 PM EDT Reads: 202
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 06:45 PM EDT Reads: 255