Share:
AMOA
Synetis supports its customers from the scoping / consulting - upstream - phases to the project management in the integration phase and the follow-up of the deployment.
Projects related to Digital Identity always have a strong organizational and functional connotation , but the technical constraints are never to be neglected.
In such a context, it is important to have a trustworthy support with a real feedback on projects and solutions in order to be able to adopt a pragmatic and realistic approach.
Maturity audit
Digital identity is a broad topic for organizations - whether it's IGA, AM, DAG, PAM, CIAM, etc. What are the issues behind each of these topics? Is my organization mature on all of these issues? Am I truly compliant with current regulations? ;
At Synetis, we have developed a flash audit offer that allows you to analyze the level of maturity of your organization on all these subjects with respect to the state of the art of IAM, taking into account the regulations to which you are subject, the needs of external auditors, as well as the business needs;
This offer will allow you in a few days to identify the weak points to remedy at first, but also the strong points on which to capitalize during your future projects.
Consulting / Framing
- The maturity of the ecosystem in place in relation to the state of the art of the targeted IAM domain, possibly through a risk analysis phase;
- The current issues of the ecosystem analyzed through interviews with the various actors of the processes related to the scope of the mission;
- The strengths (technical, functional and/or organizational) on which to build the target to be reached.
The definition of the target is based on the elements collected during the previous stage. Following the findings of the analysis phase, Synetis proposes several potential targets, adapted to the customer's context, which form a basis for reflection in workshops with the project team. The aim of these workshops is to define the target ecosystem by combining the expertise of Synetis contributors with the ambition of companies and organizations.
Each context being different, the scoping mission must be adapted and the best compromise must be found for each company and issue. Once the target is validated, the trajectory to reach the target must be determined. The possible trajectories are expressed by taking into account the projects in adherence, the planning objectives set, the budgetary constraints identified, etc.
This stage must allow for the formalization of the project's major projects to be launched, as well as the solution's deployment strategy (application deployment, deployment by population, deployment by functionality, etc.). For each step, the following are specified
- Gains made;
- Risks addressed;
- Any decommissioned components;
- The subdivision of the project step by step.
For the success of a scoping mission, here are some points of attention:
- A controlled perimeter;
- The availability of the actors involved;
- An analysis of the existing situation validated by the experts on the side of the project applicant;
- An inventory of needs with prioritization;
- Iterative validation of the deliverables through intermediate reports;
- The definition of an achievable target within a well-defined timeframe.
To go further...
Synetis also assists its customers in the choice of IAM solutions. Several approaches are possible and the choice methodology depends on the company:
- Recommendation of solutions adapted to the customer context based on the Synetis experience;
- Drafting of specifications for a wider competition of market solutions;
- Organization of demos or PoCs;
- Accompaniment for the RFI and RFP phases (analysis, participation in the defense, decision support).
AMOA - Assistance to the project owner
During the integration phase of a project, Synetis provides assistance to the project owner to the business lines:
Assistance for the design phases: functional and technical specifications, technical architecture file;
Definition of the acceptance strategy: test strategy, test plan, data sets, etc. ;
Technical and functional acceptance of the solution;
Deployment Preparation;
Work on data quality.
Access Management at Synetis
More than 45 consultants dedicated to Access Management with an average experience of more than 5 years in the field of cyber security;
More than 8 active partnerships with major market players (Microsoft, Ilex International, InWebo, Okta, Ping Identity, CyberArk, Wallix / Trustelem, Yubico) and a real expertise with other software vendors such as ForgeRock, Microsoft, OneLogin, etc. ;
Over 20 publisher certifications acquired;
More than 65 projects in progress as of 01/08/2022 - including 40+ new projects in 2022 - of all sizes (from about 10 days to more than 250 days) and of all types (scoping, audit, integration, TMA, CDS), with a commitment to results (fixed price) or to means (contracting).
Synetis is also able to organize the governance of the project: project management, organization and animation of the committee, progress and risk monitoring, deployment monitoring, etc.
Finally, Synetis supports its customers in change management and communication activities, from raising awareness among the various players to training and running skills transfer sessions.
Synetis is able tosupport its customers in the entire scope of digital identity through its consulting and project management activities:
Repository, lifecycle (process), role model, request management, self-service, provisioning, recertification, audit and compliance, etc. ;
Security repository, application inventory, SSO (eSSO, Web SSO, identity federation), MFA and adaptive authentication, API security, etc. ;
Inventory of resources and rights, centralization of privileged accounts, session registration, password rotation, etc. ;
Data classification, rights inventory, document access certification, access request process, etc. ;
Customer repository, on-boarding / off-boarding, consent, self-service, progressive profiling, synchronization, etc.