Identity Management (IdM) Software & Solutions
We all rely on trusted identities. In a world of multiple identities, how can you be sure that someone is who they claim to be? Successful IDM demands the seamless integration of systems, policies and procedures across mission and functional areas.
CSC delivers Identity Management (IdM) solutions based on a proven methodology that enables clients to meet internal and external identity management needs in a secure, compliant, and cost effective manner. Following our “Foundation Builder Approach”, that limits the initial deployment scope to ensure success and put in place the foundation for the follow-on system integration effort.
Our Solutions and Services offerings portfolio includes:
- Identity and Access Management
- User Provisioning
- Role Management
- Authentication services
- Authorization
- Web and Enterprise Single sign-on
- Federated Identity Management (FIM)
- Cross domain single sign-on based on trust relationships
- Federation for CSC outsourced clients to access support applications
- Cloud SSO powered by PingFederate®
- Access Governance
- Integrates compliance management and identity lifecycle management functions
- Reduces cost and complexity associated with managing identities
- 7x24 Operational Support Services
- Identity Management Consulting Services
- Current state assessments
- Workshops
CSC delivers Identity Management (IdM) solutions based on our Foundation Builder Approach to meet client internal and external identity management needs in a secure, compliant, and cost effective manner. The approach, based on our experience, limits the initial deployment scope to ensure success and put in place the foundation for the follow-on system integration effort. The solution deployment is accomplished in four phases:
- Phase 1 - Assess: We begin with an assessment to gain an understanding of the client’s identity management vision and strategy from both the business and technical perspectives. From the assessment, we are able to ensure the identity management solution meets near-term requirements while leveraging technical investments and operational preferences consistent with longer-term plans.
- Phase 2 - Plan: This phase is about design and development activities that allows for the requirements gathered to be mapped to the technology and processes used to implement the end solution. This will ultimately dictate how the solution will fit into the business processes and technical aspects of the design.
- Phase 3 - Build: Represents actual migration of the platform data and deployment of the Identity Management software and infrastructure. At this point the design can be verified and all aspects tested for functional and architectural fit before proceeding with deployment. During this phase, business and technical issues that arise can be mitigated and design corrections made. Phase ends with production rollout.
- Phase 4 - Manage: Provide Operational Support Services
Our Capabilities
- Full Service
- Consulting
- Current State Assessment
- Service design, development, and integration
- Operational support services
- Dedicated security professionals
- Trained and experienced with:
- IBM, Sun, Oracle, Novell, CA, Ping Identity, RSA, Microsoft (ADFS), VeriSign (Symantec), and Quest (former Voelcker ActiveEntry) solutions
- Biometric/smart card technologies
- Trained and experienced with:
- Identity Management network of centers
- Identity Management Lab, Newark, DE
- Identity Labs, Fairmont, WV
Our Experience
- Identity and access management solutions and services
- Designed, deployed, and support global PKI authentication solution for Fortune 500 company
- Designed, deployed, and supported identity management and access management solution for federal healthcare agency (currently updating solution to new vendor product)
- Provided identity management operational support service for insurance services company
- Designed a comprehensive identity and access management solution to support more than 240,000 users for a Fortune 500 enterprise
- Designed, deployed, and support 10 global, strong authentication systems supporting more than 140,000 users
- Developed, deployed, and support global customized user-provisioning tool integrated with strong authentication system for major Fortune 500 client servicing more than 90,000 users
- Developed and support unique, certificate-based, strong authentication solution for SAP environment
- Designed and deployed biometric and smart card technology-based solutions for the Department of Defense and other federal agencies
- Designed and deployed Identity Management solution for the world’s largest reinsurance company
- Managed Identity management design projects for major European Banks, Insurance companies, an Manufacturing companies
- Federated identity management solutions and services
- Developed, deployed, and support eight “client-to-CSC” federations servicing more than 180,000 users
- On-boarding additional applications and providing operational support service to major UK consumer goods client
- Ongoing deployment at major U.S. health insurer to support up to 5 million users
- Ongoing deployment at U.S. Government Agency
Success Stories with our IdM Solutions
How CSC Can Help
CSC specializes in delivering comprehensive identity-based solutions that provide the tools to manage user identities, their entitlements, and control access to information which are essential for protecting (and sharing) organizational information while meeting regulatory and security requirements. We blend the latest technologies, systems, policies and business processes to deliver integrated identity management software and solutions that are secure, efficient and increase business value.
Vendor Neutral
By intelligently applying the latest identity technologies we are able to develop compliant systems that meet our clients’ exact mission needs. And since we are not tied to any particular vendor or technology, we are able to choose from all leading edge technologies. We also seek to leverage existing technology whenever possible to minimize costs and take advantage of your current infrastructure. Our identity management and access control systems have interoperability and scalability built in, enabling divergent systems to seamlessly communicate across physical and logical infrastructures.
Global Perspective
At CSC, we specialize in creating solutions that not only establish trusted identities but also protect the personal information of every citizen. We have a proven record of implementing large-scale identity management, credentialing and biometric security programs for government and business clients around the world. This global perspective enables us to leverage the best solutions from diverse areas and quickly develop cost-effective systems that work seamlessly across the enterprise and around the globe.
Creating Business Value
Technology alone is not enough. Rather than implementing credentialing or security technology in isolation, we look at identity and access management as part of your entire mission. Only then can we implement an integrated solution that creates confidence and earns trust. Supported by our excellence in business process management and our expertise in managing complex mission-critical systems, we deliver solutions that not only maximize security but also enhance individual productivity, improve service and reduce costs. We optimize system deployment and operation through a robust transformational program that can include a requirements and risk analysis, process redesign, policy recommendations, system integration, and services that help promote both compliance and user adoption. As a result, our IdM solutions not only improve physical and logical security but also create business value.
Industry Leadership
Our comprehensive identity management solutions keep pace with the constantly evolving privacy and regulatory environment, including the National Strategy for Trusted Identities in Cyberspace (NSTIC), CSC was the first organization to achieve an SSE-CMM Level 4 rating for INFOSEC assessments, and a founding member of the Information Technology (IT) Information Sharing and Analysis Center (IT-ISAC) and active member of both the President’s National Security Telecommunications Advisory Committee (NSTAC) and the National Security Information Exchange (NSIE).



