Identity and Privacy Assurance Overview
We look at IDM as part of your entire mission.
Government and business rely on trusted identities. Whether you are protecting critical infrastructure or vital information or you are securing a facility or a border, you need to answer the same question: In a world of multiple and shadowy identities, how can you establish, with absolute certainty, that someone is who he or she claims to be?
Beyond a Shadow of a Doubt℠: How CSC Can Help
CSC specializes in delivering comprehensive identity-based solutions that are Beyond a Shadow of a Doubt. We blend the latest technologies, systems, policies and business processes to deliver integrated identity management and privacy assurance solutions that are secure and efficient and increase business value. Our Trusted Identity Enterprise Suite™ is playing an important role, protecting individuals, corporations and governments worldwide.
Vendor Neutral
By intelligently applying the latest identity technologies, such as biometrics and radio frequency identification, we are able to develop compliant systems that meet our clients’ exact mission needs. And since we are not tied to any particular vendor or technology, we are able to choose from all leading edge technologies. We also seek to leverage existing technology whenever possible to minimize costs and take advantage of your current infrastructure. Our identity management and access control systems have interoperability and scalability built in, enabling divergent systems to seamlessly communicate across physical and logical infrastructures.
Global Perspective
At CSC, we specialize in creating solutions that not only establish trusted identities but also protect the personal information of every citizen. We have a proven record of implementing large-scale identity management, credentialing and biometric security programs for government and business clients around the world. This global perspective enables us to leverage the best solutions from diverse areas and quickly develop cost-effective systems that work seamlessly across the enterprise and around the globe.
Privacy Assurance
When it comes to identity management, trust is not a one-way street. A successful solution must not only establish foolproof identification, but it must also protect personal information. That’s why privacy assurance is a top priority and integral component of all our identity management solutions.
Our broad range of experience across government entitlement programs, health services and commercial applications has allowed us to build an expertise in reconciling identity, security and privacy issues. Clients trust our extensive IT and identity management expertise to protect and assure personal information.
Creating Business Value
Technology alone is not enough. Rather than implementing credentialing or security technology in isolation, we look at identity management as part of your entire mission. Only then can we implement an integrated solution that creates confidence and earns public trust. Supported by our excellence in business process management and our expertise in managing complex mission-critical government systems, we deliver solutions that not only maximize security but also enhance individual productivity, improve service and reduce costs. We optimize system deployment and operation through a robust transformational program that can include a requirements and risk analysis, process redesign, policy recommendations, system integration, and services that help promote both compliance and user adoption. As a result, our solutions not only improve physical and logical security but also create business value.
Industry Leadership
Our comprehensive identity management solutions keep pace with the constantly evolving privacy and regulatory environment, including the National Strategy for Trusted Identities in Cyberspace (NSTIC), Identity, Credential and Access Management (ICAM), and Personal Identity Verification Interoperability (PIV-I) requirements. CSC was the first organization to achieve an SSE-CMM Level 4 rating for INFOSEC assessments, and a founding member of the Information Technology (IT) Information Sharing and Analysis Center (IT-ISAC) and active member of both the President’s National Security Telecommunications Advisory Committee (NSTAC) and the National Security Information Exchange (NSIE).
![]() |
Financial Benefits • Increased employee productivity and decreases IT labor • ID administration labor savings • Single sign on saves employee time and increases productivity • Password reset and management labor saving • Faster implementation of policies reduced labor needs • Reduction of external audit/accreditation costs |
![]() |
Enterprise Benefits • Management of corporate risk • Framework developed for interworking across different business groups • Construction of an inter-working business model • Common interfaces developed to external parties |
![]() |
Security Benefits • Stronger authentication of identities • High accuracy in the digital identities throughout the various systems within the enterprise • Stronger authorization and privilege management • Accuracy in the provisioning/de-provisioning processes • Reduced risk of unauthorized access to facilities and networks • Documented, common, enterprise-wide policies and processes • Consolidated storage of credentials |
![]() |
Physical Access Capabilities • One digital identity for an individual in all enterprise systems, including (PACS) • More detailed provisioning based on role and attribute • The ability to easily audit who, when and where an individual entered/exited a room or facility • Removal of dormant physical access privileges • Physical access privileges placed on credential (which is bound to an individual’s identity) |
![]() |
Logical Access Capabilities • One digital identity for an individual in all enterprise systems, including (LACS) • Password reset and synchronization • Role based provisioning to enterprise networks • Automated audit tools • Detailed privilege management |





