SYS-CON MEDIA Authors: Jim Kaskade, Yeshim Deniz, Elizabeth White, Greg Ness, Sean Houghton

News Feed Item

Dell One Identity Manager Safeguards and Empowers Organizations by Granting Appropriate Access to Needed Resources

Dell announces the recent selection of Dell One Identity Manager by Trillium Health Partners and Dell itself to address the challenges presented by today’s constantly shifting user access landscape, which includes the need to control access to a moving target of applications and data, and to provide access to everything from everywhere, without sacrificing security. This move marks the renewed emphasis by organizations to enable appropriate access, while eliminating the risk of employees having more access than they need to do their jobs. Employees with too much access can become internal threats, which are the most prominent threats in the security landscape today.

Although organizations increasingly find that inappropriate access by end users, partners, and administrators is one of the vulnerabilities putting them at greatest risk, they also must adhere to compliance regulations without sacrificing users’ ability to get to what they need, when they need it. The choice of Dell One Identity Manager signals a focused move to stay ahead of these evolving requirements.

With Dell One Identity Manager, organizations have a modular, integrated and affordable way to establish, execute, audit, and control access, no matter what needs to be accessed, who is accessing, how, or from where. While improving security, the solution also boosts business agility by enabling the organization to assign permissions faster — to the right people — increasing productivity and achieving compliance faster, and with less cost and effort.

Simplifying Global Identity and Access Management

Dell’s deployment of its Identity Manager solution has provided significant value to the company, increasing compliance and operational efficiency across its global network. The challenge of appropriately granting and tracking the access privileges and permissions on the corporate network for Dell’s 150,000 employees, consultants and contractors worldwide was due to an ongoing process of employee and consultant onboarding, as the organization looked to grow its salesforce and acquired new companies.

With the deployment of Dell One Identity Manager, Dell has grown from its original identity and access management (IAM) solution, and now can rely on a global, intelligence-driven IAM platform that ties identities, permissions and roles to business rules. The company can track and report on rights, activities and policies in real time using the solution’s access management and reporting tools. The Identity Manager platform also has helped Dell save time by improving self-service and workflow, placing important tasks, approvals, and reports in the hands of line-of-business personnel rather than IT.

Supporting Quotes:

John Milburn, executive director, Identity and Access Management, Dell Software

“Dell understands that IAM needs continue to change with new threat landscape and governance needs, and for that reason, we continue to add capabilities to our Identity Manager solution so our customers can stay ahead of the next threat. Dell places a high priority on leveraging its own IP to create more secure, agile and productive work environments for its employees. We’re pleased to provide such a valuable contribution to protecting and better serving not only our own employees, but also our customers, who use it to secure their clients, patients and partners.”

Alan Daines, Chief Information Security Officer, Dell

“With a team of more than 150,000 employees, consultants and contractors worldwide, it was critical that we focus on providing a secure environment that did not stand in the way of people doing their jobs, and also could evolve with business needs. We needed a sound IAM solution that would address our large-scale needs, and still be flexible enough to grow with our business. Dell One Identity Manager uniquely fits the bill both now, and where Dell is heading in the future. This deployment puts us in a much better position to evolve with market movements and create opportunities for company growth.”

Iain Paterson, Information Security Officer, Trillium Health Partners

“Improving security in a healthcare setting is a journey, and, at Trillium, we’ve begun the journey by addressing our access challenges. It has always been difficult to efficiently manage and provide appropriate privileges for our complex and diverse user base, but, with Dell One Identity Manager, we’ve transformed business processes while addressing this core problem. We’ve reduced our risk profile and improved the IT/business relationship with faster provisioning of users, simplified roles and privileges, and attestation, and we intend to leverage even more of Dell One Identity Manager’s functionality as we continue on our security journey.”

Supporting Resources:

Delivering Complete and Connected Software Solutions

Dell Software empowers companies of all sizes to experience Dell’s “Power to Do More” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.

About Dell

Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Tweet This: Dell One Identity Manager Safeguards, Empowers Orgs by Granting Appropriate Access http://dell.to/1noqx2G

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!