Cyber Identity and Access Management
Secure, Efficient, Integrated Identity Management Solutions
As criminals continue to expand their reach and regulators introduce mandates to increase the level of trust for online identities, identity management solutions have kept pace.
Our Cyber Identity and Access Management portfolio provides the tools to manage user identities and their entitlements, and control access to information while meeting regulatory and security requirements.
We blend leading technologies, systems, policies and business processes to deliver integrated identity management solutions that are secure, efficient and increase business value. Our services include:
Identity Management Consulting
Using our internally developed Foundation Builder approach, CSC identity management specialists assess an organization’s current state of identity management and evaluate the best pathways forward to help meet internal and external identity management needs. This approach enables a successful launch of new identity management processes and establishes a solid foundation to address future trends and capabilities.
Identity and Access Management
We implement, deploy and operate an integrated, end-to-end identity management solution that automates user account creation, lifecycle management, user authentication and single sign-on. Our Identity and Access Management services address:
- User Provisioning
- Role Management
- Authentication and Authorization
- Web and enterprise Single Sign-On
- Managed Public Key Infrastructure Certificate Program for device, user and mobile authentication
Federation and Single Sign-On
As part of our Indentity Management Services portfolio, CSC offers Federation and Cloud Single Sign-On solutions that meet requirements for implementing identity strategies for cross-domain Single Sign-On. Our experience in the federation of identity credentials helps our clients rapidly give customers, partners and employees access to company data, while still implementing strong security controls and ease of use.
Identity Governance and Administration
Our Identity Governance and Administration Services centralize identity data, role management, access policy and risk modeling to support analysis of combined entitlements, segregation-of-duties enforcement, audit-case incident management and compliance analytics. This solution’s core functionality includes enterprise automated provisioning and access management initiatives. Dashboards provide transparency to critical identity governance and entitlement data, delivering at-a-glance charts, graphs and reports.
Privileged Account Management
CSC’s Privileged Account Management technologies help organizations protect critical assets and meet compliance requirements by securing, managing and monitoring privileged accounts and access. This solution applies to administrative access spanning a wide range of systems and infrastructure — from accounts on operating systems, databases, middleware and applications to network devices, cloud infrastructure and software-as-service applications.
CSC combines more than 40 years of experience in information security with leading tools and methods to support your security program and protect your operations. Our deep industry knowledge, our more than 1,800 security specialists and our end-to-end solutions for traditional and next-generation technologies enable clients to securely adapt as their business and risks change.
See how CSC can help you manage identities across your enterprise. Learn more.