Micro Focus Ireland Ltd

Micro Focus Identity & Access Management

Identity-Powered Access solutions that integrate Identity and Access Management (IAM / IDAM) policies across local, mobile and cloud environments. Integrated identity information used to create, modify, and retire identities and control their access. We provide Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory administration.

Features

  • Single entry secure access to Enterprise and Cloud Applications
  • Multi factor Authentication for all devices across the organisation
  • Cloud Access management logging and reporting
  • Granular management of Active Directory and Office365 privileges
  • Identity Governance managing and enforcing entitlements across the organisation
  • User identity tracking and management of entitlements
  • Privileged Account Management and tracking of change
  • Secure Login and Single sign on to streamline user authentication
  • Self Service Password Reset and management across the
  • Change guardian file change management and control

Benefits

  • Fast and secure user access to the correct resources
  • Govern access across the organisation for regulatory compliance
  • Control and manage privileged user activities
  • Proactively identify threats and reduce risk
  • Strengthen authentication without reducing productivity
  • Visibility over who access/changes what and when
  • Secure credentials for cloud service providers (AWS, Azure)
  • Define/Manage optimal roles needed to support business requirments
  • HR Integration for governance and compliance - Joiners Movers Leavers
  • Easy access through affiliated and social identities

Pricing

£25000 to £1000000 per licence per year

  • Free trial available

Service documents

G-Cloud 10

507272300401544

Micro Focus Ireland Ltd

Steve Garry - Micro Focus G-Cloud11 - IDAM Team

07881 953791

steve.garry@microfocus.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Identity and Access Management is often closely coupled with Integrated HR, Risk, Governance and Compliance programs and may be delivered as a complete solution or in individual elements depending on end user requirements. Our IDAM Solutions are flexible and adaptable to work with other vendor technologies too
Cloud deployment model Hybrid cloud
Service constraints There are no specific constraints that should be noted but as with all hybrid capabilities the specifics of a configuration should be discussed in detail and planned to provide optimum service capability for your business requirements. Micro Focus provide planning, implementation and configuration services to end users as well as through many specialised and certified partners.
System requirements System requirements will be determined by the selected services

User support

User support
Email or online ticketing support Email or online ticketing
Support response times All response times are dependent on the level of service requested.

Indicative SLA's are : Severity 1 - 1 Hour Severity 2 - 3 Hours Severity 3 - 6 Hours Severity 4 - 1 Business Day
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Window available on Software Support Online (SSO) website. Non technical staff available to log or manage calls
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Choose the level of support you need:
1 - Assigned Support Engineers - Available over the phone during business hours.
2 - Primary Support Engineer will visit you on-site periodically during the year and, with the purchase of Priority Maintenance, are available 24x7 by phone for emergency situations.
3 - Dedicated Support Engineer (DSE) is located in your office and focused on your business systems' needs. 4 - Service Account Management with a Premium Support Engineer works with you to ensure you get the most from your solutions gaining an in-depth knowledge of your technical support needs.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Comprehensive onsite tailored/bespoke training and Online training are both available and compliment our documentation which provides complete detail on configuration models, usage instructions and user scenarios.

Through our consulting services and those of our certified partners we offer solution, planning, configuration, implementation and fast start services.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data extraction may be provided by our service as a standard offering or bespoke tailored solution depending on requirement.

Facilities are provided to allow export of data from the application. The exact requirements for data extraction at the end of the service contract will be negotiated between the customer and the chosen hosting partner.
End-of-contract process All Data management, governance and compliance with regulations applicable will be the responsibility of the client during the term of the agreement. Data extraction will be the responsibility of the client and at the clients expense prior to termination of the contract.
This will be negotiated between the customer and hosting partner as part of the service scoping exercise.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Administration services unavailable on mobile devices
Accessibility standards None or don’t know
Description of accessibility Text and diagram scaling
Accessibility testing Testing with visually impaired
API Yes
What users can and can't do using the API Users have access to published API's enabling them to complete most tasks via the API's for managing and reporting on the IDAM platform.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Most anything is possible and should be discussed with the Planning team to ensure that Customisations are necessary and that there are no alternatives which are more cost effective and suitable for the requirement.

Scaling

Scaling
Independence of resources The solution is scalable. A scoping exercise between the customer and chosen hosting partner will identify the different workloads over time and required resources required to support those workload

Analytics

Analytics
Service usage metrics Yes
Metrics types Further information will be provided as part of the planning process to be discussed with the Micro Focus technical team
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Data Protection at rest will be discussed and provided by the customer's chosen hosting partner
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach To be agreed - Data dump from database - command line application provided API call to database to export data to a pre-defined format (json, csv)
Data export formats Other
Other data export formats Standard formats will be determined and used
Data import formats Other
Other data import formats Standard formats will be determined and used

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Data Protection between networks will be discussed and provided by the customer's chosen hosting partner
Data protection within supplier network Other
Other protection within supplier network Data Protection within networks will be discussed and provided by the customer's chosen hosting partner

Availability and resilience

Availability and resilience
Guaranteed availability This guarantee will be negotiated between the customer and chosen hosting service delivery partner.
Approach to resilience Service resilience will be negotiated between the customer and chosen hosting service delivery partner.
Outage reporting Outage reporting will be provided by the chosen hosting partner.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Roles can be defined to determine the provide and/or restrict access as appropriate
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 22/08/2017
What the ISO/IEC 27001 doesn’t cover This certification is for Software support services
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security Governance will be a topic to be covered by the chosen hosting supplier
Information security policies and processes Security policies and processes will be a topic for discussion with the chosen hosting partner.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Vulnerability management will be provided by the chosen hosting partner.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management will be provided by the chosen hosting partner.
Protective monitoring type Supplier-defined controls
Protective monitoring approach These facilities will be provided by the chosen hosting partner.
Incident management type Supplier-defined controls
Incident management approach The incident management process will be provided by the chosen hosting partner.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £25000 to £1000000 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Included Software license for Evaluation (Non production) use. Excluded Post sales technical support service. Period Standard is a maximum of 3 months although extensions to the 3 month period may be granted by the local account team.

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑