ID#12SS0002 Last Modified 01.19.2012 © 2012 FishNet Security. All rights reserved. Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406 Securely Enabling Business Identy and Access Management Overview FishNet Security is the naon’s leading full-service informaon security soluons provider, with extensive consulng and systems integraon offerings focused on Identy and Access Management (IAM). Here is what we offer: • A highly-trained, U.S.-based expert team of IAM specialists to bring a wealth of diverse knowledge and experience to every engagement. • Strong collaborave relaonships with best-in-breed vendors combined with a technology-agnosc approach to IAM challenges allow strategic processes to self-idenfy the best soluon. • With over 30 offices and training centers naonwide, our naonal presence is backed by senior leadership with a regional focus. What We Do As a strategic partner, FishNet Security delivers unmatched IAM knowledge and soluon programs that can help you effect lasng change in IT and business processes. Our vast experience developing strategic approaches and soluons for nearly every vercal market allows us to leverage a wealth of experience and experse in solving your IAM challenges. Through our proven IAM5™ Process , we provide strategic guidance, implementaon and support services that incorporate leading IAM plaorms and specialized service offerings. IAM5 Phase Strategic Services Taccal Services 1. Envisioning Phase • IAM5 Workshop • Architectural Design Strategy • Exisng Deployment Health Check 2. Planning & Preparaon Phase • Compliance & Identy Management Readiness (CIMR) • Vendor Selecon and RFP Management • IAM Program and Governance • Business Process Opmizaon Assessment • IAM Replacement Analysis • IAM Maturity Assessment • Credibility Phase Scope for Detailed Analysis and Design 3. Credibility Phase • Managed Services for Identy • Identy / Role Management QuickStart • Identy Management Rapid Applicaon Framework • Product Replacement Deployment Project • Soluon Development, Deployment & Implementaon • Directory / AD clean up • IAM5 Foundaon Plaorm 4. Growth & Sustainment Phase • Operaonal Sustainment from the Credibility Phase • Implementaon of Expanded Soluon Funconality • Adopon of IAM Governance Commiee • Growth in the Deployment of new funcons • Producon Support • Knowledge Transfer & Training 5. Opmizaon & Transioning Phase • Operaonal Sustainment of mulple producon releases • Compleon of a Health Check to opmize performance • Implementaon of expanded funconality • Roadmap and Strategy Refresh • Connued Expansion & Growth of previous phase releases • Technology Upgrade • Complete Transion of IP and responsibilies to Client • Infrastructure Opmizaon