A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Transitioning an Insurance Provider from On-Premises to SaaS-based Identity Governance and Administration (IGA) Platform Overview Adopting a Cloud-First Strategy A leading insurance services provider was heavily utilizing an on-premise identity governance and administration (IGA) platform to manage and secure identities within their complex environment. Driven by an enterprise-wide cloud-first strategy, the client wanted to transition into a SaaS-based IGA platform. The requirement was to upgrade their on-premise infrastructure and operational needs into a modern IGA platform with the latest and greatest Artificial Intelligence (AI) and Machine Learning (ML) capabilities. Since the client needed a trusted advisor with proven expertise in IGA and migrating to a cloud-based identity security solution, they turned to Optiv. Optiv was already involved in helping the client with their on-premise IGA platform and well-acquainted with their environment. How Optiv Helped Collaborating with SailPoint for Identity-Centric Security Optiv played a pivotal role in migrating the client’s existing capabilities from SailPoint IdentityIQ (IIQ) to Identity Security Cloud (ISC) and identifying areas of enhancements in their IGA processes and identity data. The team refined and simplified the processes and identity data by migrating the existing features, infrastructure, configurations and workflows from SailPoint IIQ to ISC, while cleaning up identity data such as roles, profiles and more. To accelerate the migration, Optiv experts established an operating model for leveraging the toolsets available with SailPoint and led the way with setting up roles and responsibilities and an operating model to utilize the toolsets and build efficiencies into the process. Image Download a printable version of this case study Download Case Study Industry Served: Insurance Client Challenges Significant maintenance and upgrade costs associated with heavily utilizing an on-premise platform Challenges with managing a backend infrastructure with approximately 40k identities and 15 integration points Impacted time to value for new product releases due to lack of functionalities Optiv’s Actions Established an operating model with SailPoint services to drive the transition from SailPoint IIQ to ISC Streamlined and refined identity data and helped identify areas of enhancements to the IGA lifecycle processes Migrated to SailPoint ISC within the forecasted timeline Developed a tactical roadmap to continue IGA capability maturity through ISC Results/Client’s Success Minimized downtime and accelerated time to value for new product features and services Ability to deploy new products and adopt features faster 360-degree visibility, insight and remediation to adapt and ensure the security of every identity Automated and streamlined identity processes to better discover, manage and secure user access Access to new features released to the SailPoint ISC, which are deployed automatically with zero downtime How can we help you secure greatness? Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition. Let's Get Started
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?