It is usually IT that experiences the biggest impact from Vizor Complete. The adoption of role-based IT resource standards across the organization creates time savings, reduces errors and wastage. The service delivered by IT to the rest of the organization is enhanced. As a side-effect, the profile of IT is also raised, improving interaction with user departments.
“Vizor Complete brought our HR, IT and Security Chiefs into the same room at the same time. A first for our organization!”
Provisioning IT for new hires
Ensuring new hires are equipped with their IT resources from day one is a key organization objective.
- Business Managers use their New Hire Portal to define their new hires and their IT resources. The Role-based Resource Catalog streamlines this task and promotes configuration standardization. IT avoids the time consuming process of verifying the detail of the requested resources.
- New Hire Workflow enforces any additional authorization procedures and delivers the provisioning request to IT.
- Automate the core Identity and Access Management tasks of Active Directory and Exchange account creation.
- New Hire Workflow includes early reconciliation of user information held by HR and in Active Directory.
Managing Applications and Privileges
IT has to be equally diligent in managing changes in IT resource requirements when personnel change roles and assume new responsibilities.
- Application and Information Access Management Portal provides IT, InfoSec and Business Managers with a shared view of the history of all application and information access privileges.
- Authorization Workflow ensures continuity of security through any provisioning changes, with a batch mode for bulk changes of activity for groups such as medical student interns.
Managing Terminations
Much of the failure to recover and recycle IT assets is due to a lack of process around termination. Failure to react promptly to terminations also constitutes a security risk.
- Through tracking terminations and directing de-provisioning, Ensure IT are made aware of opportunities for re-allocating resources and saving cash.
- Manage the cancellation of access privileges at the correct time, with IAM automation contributing to improved security, efficiency and traceability.