Case Studies

Access Governance

Access Governance

Background – Regional Retail and Commercial Bank

A Regional Retail and Commercial Bank was looking to automate existing manual processes for performing access reviews in order to improve their overall security and audit posture.

Additionally, it needed to automate processes related to identity governance and access certi cation in order to reduce costs and improve efficiencies around access compliance.

Access Request Management

Access Request Management

Background – Global Construction and Energy Client

A Global Construction and Energy client contracted Anomalix to determine how to best migrate away from two homegrown access request tools. These tools were found to be expensive to maintain and did not provide suf cient visibility into the user access request process. Our client required a single security and compliance-based access request solution and increased visibility into user access to meet operational and compliance needs.

Enterprise Roles & Attribute Based Management

Enterprise RBAC/ABAC

Background – Global Manufacturing Company

A Global Manufacturing company selected Anomalix to build an enterprise
wide RBAC and ABAC strategy to solve manual access administration activities related to user turnover. Anomalix was able to establish a baseline of common access across the various job functions with high turnover. By identifying speci c granular entitlements that controlled user access within critical applications by job function, Anomalix was able to identify and encapsulate roughly 80% of user access in Job roles.

IDAAS and SSO

IDAAS and SSO

Background – Regional Health Insurance Company

The Regional Health Insurance provider has over 30K internal users and over 150K patients with up to 500 access related requests in a given day. These requests were directly to 20 mission critical applications that are heavily regulated with complicated request and approval workflow requirements. Additionally, the provider had many disparate authoritative sources for identities and multiple points of entry for where an identity could be uniquely created. This created a situation where administrators lacked the ability to enforce enterprise security policies at request time.

Identity Analytics: Detect and Respond to Anomalous Access Behavior

Identity Analytics

Background –Global Financial Services Client

A Global Financial services company selected Anomalix to build an Identity Analytics engine to detect anomalous access related behavior. Specifically, the client was looking to implement real-time activities.

Data Access Governance

Data Access Governance

Background – International Investment Management Firm

An international investment management rm engaged Anomalix to develop
a comprehensive solution for managing user access to its unstructured data. Much of the client’s sensitive data was spread out amongst multiple disparate le shares, SharePoint sites, and databases. They lacked visibility into who could access this information. This made compiling compliance information
for auditors both time consuming and error-prone.