Académique Documents
Professionnel Documents
Culture Documents
Business Rationale 2
Services 3
Our Solution 5
Our Approach 6
Near-future Developments 8
About Us 9
the way we do it
2
the way we do it
Services
Service Functionality
4
the way we do it
Our Solution
1. Security
y
2. Application andFunctional Track 3. Authorization 4. Business Operations 5. Service & Provisioning 6. Systems and
Information system management The use and maintenance of authorizations made Release authorizations and/or information/extra applications
available resources
functional design Design and Implementation Presenting authorizations inof : that the
a form Non-Personal Accounts -, ACL -, Profile
business can understand and can act upon Management
• necessary
Defining which authorizations are Security for policy
which activities.
• Separation ofCRDuty catalog role
HR-proces
A1 A2 A3 A4 A5
Afdelingsproces
1 Invisible Infostructure is the end-state of infrastructure as we currently know it, using virtualization, grid and automated management technologies to deliver infrastructural services as a
commoditized—preferably invisible—utility.
6
the way we do it
8
the way we do it
About Us
About Capgemini
Contact:
Barry Beal (UK), Managing Technical Architect
Coen de Jonge MSc CISSP CISA (NL), Managing Consultant
Jan-Roel Löwenthal MA. BA. CISSP (NL), Managing Consultant
Abdullah Rashid CISSP (USA), Senior Manager
securityservices@capgemini.com