{"id":7040,"date":"2018-10-11T18:16:43","date_gmt":"2018-10-11T16:16:43","guid":{"rendered":"http:\/\/dev-en.deron.de\/?page_id=7040"},"modified":"2018-11-28T17:32:10","modified_gmt":"2018-11-28T16:32:10","slug":"sensitization","status":"publish","type":"page","link":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/","title":{"rendered":"Sensitization"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"%E2%80%9CUnderstanding_Identity_Management%E2%80%9D\"><\/span>\u201cUnderstanding Identity Management\u201d<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Sensitization is about clearing up all kinds of misunderstandings around the topic of <a href=\"https:\/\/www.deron.de\/en\/identity-management\/\">Identity Management<\/a> (IDM) and creating a common understanding of their situation and of IDM among all project participants. This includes the following elements:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>The aim of the sensitization raising phase is to inform everyone involved about what good Identity &amp; Access Management looks like and how the process of an Identity &amp; Access Management project is designed with deron. Everyone then knows the elementary components of the next phases and the corresponding milestones.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>deron clarifies the technical terms and conveys a clear picture of what a company can expect from the topic of IDM.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>We consider the needs of all users (HR, department, works council, IT, compliance\/security, etc.) and weigh them up with you. Failing to do so, the processes will end up deviating from the users&#8217; requirements. They are then misapplied, bypassed or rejected, which leads to security vulnerabilities and costs.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>deron takes a close look at the existing user administration and documents the first weaknesses. We not only look at the technical components, but also at communication problems between <span style=\"color: #222222;\">business department <\/span>and IT.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Consequently, we work with you to determine the extent to which an effective IdM requires a combination of processes to be jointly defined by IT and business departments.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>In the &#8220;Sensitization&#8221; phase, \u00a0deron will create your own individual cost-benefit overview.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>We deliver initially ideas and options for a future solution scenario.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>The final results report contains all the information and recommendations for action that have been collected. It serves as a central guiding document and argumentation aid for internal communication.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Our_Services_in_Detail\"><\/span>Our Services in Detail<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-right counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69daedb9bb566\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999999;color:#999999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999999;color:#999999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69daedb9bb566\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#%E2%80%9CUnderstanding_Identity_Management%E2%80%9D\" >\u201cUnderstanding Identity Management\u201d<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Our_Services_in_Detail\" >Our Services in Detail<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#IDM_to_Introduction\" >IDM to Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Overview_problems_initial_situation\" >Overview, problems, initial situation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Discussion_of_user_administration_vulnerabilities\" >Discussion of user administration vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#IT_between_the_technical_infrastructure_and_the_processes_of_business_departments\" >IT between the technical infrastructure and the processes of business departments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Potential_solutions\" >Potential solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Cost-benefit_overview\" >Cost-benefit overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Outlook\" >Outlook<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#Result_report\" >Result report<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<p>Sensitization is about clearing up all kinds of misunderstandings around the topic of Identity Management (IDM). It is therefore a matter of creating a common understanding of the initial situation and problems within the company for all project participants and &#8220;stakeholders&#8221;. In moderated workshops, both the necessary basic knowledge and the deeper understanding of why current processes sometimes do not function as they should are conveyed. Our many years of experience and our special project methodology, which is based on agile methods, form the basis for this. Trust that, after these first steps, everyone will speak the same language.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"IDM_to_Introduction\"><\/span><a name=\"sen1\"><\/a>IDM to Introduction<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Identity Management, which today is extended to Secure Identity &amp; Access Management (SIAM), is a far-reaching and complex field in which it is essential to maintain an overview. The term IDM is commonly used to describe IT business transactions in which accounts, roles and authorizations of identities (persons, but also objects) are managed and their access is regulated. An <span style=\"color: #222222;\">sensitization workshop <\/span>serves to give an initial orientation and to introduce the topic of IDM. Terms are explained and topics such as SIAM, SSO, SIEM or RBAC are defined so that all project participants &#8220;speak a common language&#8221; and get a clear picture of what to expect from the topic of IDM.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Overview_problems_initial_situation\"><\/span><a name=\"sen2\"><\/a>Overview, problems, initial situation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>There are many good reasons to deal with IDM, whether as a company as a whole or as an IT administrator, organizational developer, ERP department manager, works council or security officer. Because IDM is not solely a IT problem within the user and authorization administration of the helpdesk. It affects everyone, because almost every employee in a company uses IT resources that need to be managed, including the bus driver, for example, who retrieves his current roster online. But here, at the interface between user (business department) and IT (as a service provider), problems and misunderstandings regularly occur, leading to errors and security gaps and, in turn, to unnecessary risks and costs. It is therefore important for all participants at the beginning of a <span style=\"color: #222222;\">sensitization workshop<\/span> to be clear about the starting position and motivation of each individual and to weigh the different requirements and positions against each other.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Discussion_of_user_administration_vulnerabilities\"><\/span><a name=\"sen3\"><\/a>Discussion of user administration vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If one knows the concrete ACTUAL situation, the real weak points in the current user administration can be exposed quite easily. It regularly turns out that these problems and weak points are not only caused by faulty technology, but are based on insufficient agreements and communication problems between business departments and IT.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"IT_between_the_technical_infrastructure_and_the_processes_of_business_departments\"><\/span><a name=\"sen4\"><\/a>IT between the technical infrastructure and the processes of <span style=\"color: #222222;\">business departments<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>With the help of the deron 3-layer model, we explain the interaction of technical infrastructure, middleware and the process world in your organization as part of the <span style=\"color: #222222;\">sensitization workshop<\/span>. It is important to recognize that only a combination of an IDM and cleanly integrated process sequences can guarantee the success of a project. The requirements of<span style=\"color: #222222;\"> the business department ha<\/span>ve to be considered. If the departmental requirements are not sufficiently taken into account, there is a danger that the necessary acceptance in the company will be denied &#8211; the project will turn into an orphan.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Potential_solutions\"><\/span><a name=\"sen5\"><\/a>Potential solutions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>On the basis of the company-specific initial situations, the motivation and the revealed weaknesses, initial approaches to solutions can be outlined in the context of the <span style=\"color: #222222;\">sensitization workshop.<\/span> The aim here is to put together initial ideas for the further design possibilities and options of a future solution scenario.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Cost-benefit_overview\"><\/span><a name=\"sen6\"><\/a>Cost-benefit overview<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>An Identity &amp; Access Management project is always accompanied by a change in the organization. Processes, responsibilities and resources are redistributed if necessary, which of course also necessitates an update of the rules and policies. In order to attempt the next step towards an IDM, it is also important to find out what criteria can be used to evaluate an IDM project in monetary terms, what costs can be expected where and for how long, and to what extent these costs can be justified by an increase in benefits, be it through cost reduction, simplification of processes or increased security.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Outlook\"><\/span><a name=\"sen7\"><\/a>Outlook<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>At the end of the workshop it should be clear for each participant which criteria are used to evaluate an IDM project and which downstream steps are necessary. The elementary components of the next phases &amp; their milestones will be roughly outlined and brought into relation to each other.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Result_report\"><\/span><a name=\"sen8\"><\/a>Result report<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The results report contains, in condensed form, all essential information, results and recommendations for further action gathered during the workshop. It serves the participants in the internal communication as a central guideline for argumentation, provides helpful suggestions and illustrates complex correlations in a simple form.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cUnderstanding Identity Management\u201d &nbsp; Sensitization is about clearing up all kinds of misunderstandings around the topic of Identity Management (IDM) and creating a common understanding of their situation and of &hellip; <a href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"parent":6996,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-7040","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sensitization - deron<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/sensitization\\\/\",\"url\":\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/sensitization\\\/\",\"name\":\"Sensitization - deron\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.deron.de\\\/en\\\/#website\"},\"datePublished\":\"2018-10-11T16:16:43+00:00\",\"dateModified\":\"2018-11-28T16:32:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/sensitization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/sensitization\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/sensitization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.deron.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Portfolio\",\"item\":\"https:\\\/\\\/www.deron.de\\\/en\\\/service-portfolio\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sensitization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.deron.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.deron.de\\\/en\\\/\",\"name\":\"deron\",\"description\":\"Identity &amp; Access Management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.deron.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sensitization - deron","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/","url":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/","name":"Sensitization - deron","isPartOf":{"@id":"https:\/\/www.deron.de\/en\/#website"},"datePublished":"2018-10-11T16:16:43+00:00","dateModified":"2018-11-28T16:32:10+00:00","breadcrumb":{"@id":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.deron.de\/en\/service-portfolio\/sensitization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.deron.de\/en\/"},{"@type":"ListItem","position":2,"name":"Service Portfolio","item":"https:\/\/www.deron.de\/en\/service-portfolio\/"},{"@type":"ListItem","position":3,"name":"Sensitization"}]},{"@type":"WebSite","@id":"https:\/\/www.deron.de\/en\/#website","url":"https:\/\/www.deron.de\/en\/","name":"deron","description":"Identity &amp; Access Management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.deron.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/pages\/7040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/comments?post=7040"}],"version-history":[{"count":25,"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/pages\/7040\/revisions"}],"predecessor-version":[{"id":7781,"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/pages\/7040\/revisions\/7781"}],"up":[{"embeddable":true,"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/pages\/6996"}],"wp:attachment":[{"href":"https:\/\/www.deron.de\/en\/wp-json\/wp\/v2\/media?parent=7040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}