DASA: Improving identity management and patient access The Dell Deployment Services team has assisted in developing all projects. “They have a team in here and a project team in the United States. We have weekly meetings to check on the progress of the project,” says Santos. Controlling access to the production environment is very important, because the DASA ksystem controls all of the clinical analysis diagnostics. There are 20 million tests per month, so the system must be available 24x7, and for that very reason, access to this system must be strictly controlled, ensuring a centralized file with test reports and their online availability solely to patients. Santos says, “Our focus is on electronic credentials for accessing critical systems. The IAM solution adds safety and efficiency. It’s fundamental in helping us prevent fraud and control the sharing of data and information.” new profile will drop from five days to about one hour.” Improving identity management also has an impact on security. Santos says, “The patient’s test results are our most important asset. That’s why the solution adds value to the report: patients can rest assured that they can access their results when needed, and that the information has not been accessed by third parties.” About One Identity The One Identity family of identity and access management (IAM) solutions, offers IAM for the real world including business-centric, modular and integrated, and future-ready solutions for identity governance, access management, and privileged management. Learn more at OneIdentity.com The process of identity management, which the last phase of the implementation will address, is made up of modules: password reset, password vault, identity management and single sign-on. The password reset module will allow users to manage their passwords without the need for IT involvement. “In the password vault, we control access to the production environment. The management system will recognize the professional’s profile as he or she logs in, and then will provision access to the network, mail systems to be used, necessary profiles, etc. The system does this provisioning automatically, without human interaction,” says Santos. “And, with the IAM solution, the time for creating a Quest, and the Quest logo are trademarks of Quest Software Inc. Other trademarks and trade names may be used thisIdentity document refer to either of the entities claiming the marks and names One Identity and thein One logotoare trademarks One Identity LLC. Other trademarks or products. Quest disclaims any proprietary in the and names others. and aretheir property of their respective owners. Availabilityinterest and terms of marks One Identity LLC, of Solutions Availability andby terms of Quest Software, Solutions and Services vary byonly. region. case LLC study is for Services vary region. This case study is for informational purposes OneThis Identity makes informational Quest makes warranties – 2016 express orIdentity implied—in this case Reserved. study. no warrantiespurposes – expressonly. or implied—in thisno case study. © One LLC. All Rights Please complete the form to gain access to this content Access Now Related Resources Q4FY20 Fighting Pass-the-Hash With or Without Red Forest. Maintaining Business Momentum in the Face of Forced Change Optimizing SIEM Upgrade to State-of-the-Art Log Management Centralised control simplifies management, boosts security Key Findings: Privileged Access and the Impact of Pass the Hash Attacks Controlling and managing super user access H2FY20 You can get IAM right: Access Management H2FY20 IT services firm enhances UNIX security while simplifying management H2FY20 Authentication Services Single Sign-on for SAP® H2FY20 The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution H2FY20 Securely Managing Your UNIX Environment H2FY20 Managing SAP user accounts and access rights using Identity Manager H2FY20 Get IAM Right in SAP – centric organizations H2FY20 Banks Invests in Faster, more Secure IAM Processes H2FY20 The Journey to IAM Success: See how six organizations get IAM right H2FY20 Six steps to achieving data access governance H2FY20 8 Best Practices for Identity and Access Management H2FY20 Journey to IAM Success: Exclusive insights and recommendations H2FY20 Strategies to ensure the success for your identity governance project H2FY20 Get IAM Right: Identity Governance eBook
The Dell Deployment Services team has assisted in developing all projects. “They have a team in here and a project team in the United States. We have weekly meetings to check on the progress of the project,” says Santos. Controlling access to the production environment is very important, because the DASA ksystem controls all of the clinical analysis diagnostics. There are 20 million tests per month, so the system must be available 24x7, and for that very reason, access to this system must be strictly controlled, ensuring a centralized file with test reports and their online availability solely to patients. Santos says, “Our focus is on electronic credentials for accessing critical systems. The IAM solution adds safety and efficiency. It’s fundamental in helping us prevent fraud and control the sharing of data and information.” new profile will drop from five days to about one hour.” Improving identity management also has an impact on security. Santos says, “The patient’s test results are our most important asset. That’s why the solution adds value to the report: patients can rest assured that they can access their results when needed, and that the information has not been accessed by third parties.” About One Identity The One Identity family of identity and access management (IAM) solutions, offers IAM for the real world including business-centric, modular and integrated, and future-ready solutions for identity governance, access management, and privileged management. Learn more at OneIdentity.com The process of identity management, which the last phase of the implementation will address, is made up of modules: password reset, password vault, identity management and single sign-on. The password reset module will allow users to manage their passwords without the need for IT involvement. “In the password vault, we control access to the production environment. The management system will recognize the professional’s profile as he or she logs in, and then will provision access to the network, mail systems to be used, necessary profiles, etc. The system does this provisioning automatically, without human interaction,” says Santos. “And, with the IAM solution, the time for creating a Quest, and the Quest logo are trademarks of Quest Software Inc. Other trademarks and trade names may be used thisIdentity document refer to either of the entities claiming the marks and names One Identity and thein One logotoare trademarks One Identity LLC. Other trademarks or products. Quest disclaims any proprietary in the and names others. and aretheir property of their respective owners. Availabilityinterest and terms of marks One Identity LLC, of Solutions Availability andby terms of Quest Software, Solutions and Services vary byonly. region. case LLC study is for Services vary region. This case study is for informational purposes OneThis Identity makes informational Quest makes warranties – 2016 express orIdentity implied—in this case Reserved. study. no warrantiespurposes – expressonly. or implied—in thisno case study. © One LLC. All Rights