Please find below the playback recording, Presentation, useful links and Q&A
** Key Items**
- Risk index: Identity and Access Management Risk Intelligence Index
- v7.1x EOPS: RSA Reminder - End of Product Support (EOPS) Date for RSA Identity Governance and Lifecycle 7.1.x
** #17 February - Webinar Playback Video *
Recorded playback video:
** Previous Webinars **
** Next Webinar **
- Date: Wed 31st March
- Register today:
|I believe $8 per hour was used as the dollar figure for cost savings, what made you choose this number? Was it based on internal staffing costs, outsourced help desk, etc.?||
Thank you for you question. The $8 was based on the staffing costs and time saved from not having to contact the help desk as well as internal staff required for provisioning. This number could be industry standard, however, each company should determine their costs to reflect their savings.
The $8 is configurable too, it can be changed to whatever you want within the UI.
|These stats are for how many users org and how many applications are enabled for AFX||Correct. The stats are from all action performed by AFX. Example: AFX was used to grant 160 users new O365 licenses or to grant 300 users with new security groups required from an application.|
|7.5 access request - are we still constrained to have all approvals done before fulfillment starts? We have the scenario where some applications require 2nd approval and others don't - we essentially want to be able to move to fulfillment PER APPLICATION as soon as changes for that application are approved.||This hasn't changed in the sense that the whole approval phase has to be completed before fulfillment phase. However even on today's versions, you can use the new "Technical Approval" node in fulfillment workflows. Without digging much into your actual use case, you should be able to use the "Technical Approval" node to push some of your application-specific approvals into fulfillment phase.|
|What is the process of becoming a beta tester? 7.5 looks very interesting and we're in the process of upgrading to 7.2. Would be nice to skip that version 😉||
Live Answered at the end
Overall: We will invite people during the webinars months before. You still need to take the latest PROD version however.
|Is a Virtual Application cluster environment also going to get its own separate upgrade procedure as it also currently has a lot of jumping about different parts of the documentation ? Thanks||Live Answered at the end|
|Trusted apps - how do you limit the Data an app is entitled to get? If you're only limiting per web service Command (only get accounts info for a specific business source)?||Live Answered at the end|
|Any plan to stop running Collection in FIFO mode?||Live Answered at the end|
|Are there any plans to integrate with another Password Vault other than CyberArk to store the application's service account passwords used for account and entitlement collectors for example BeyondTrust.||Live Answered at the end|
|What about SLES 15?||Covered during the session and in the presentation|
|Any plans to have one unified UI for all types of reviews?||
Live Answered at the end
|Is there a plan to re-introduce the old mobile app? It was very useful to have an app to approve/deny etc...||
The app is still there on the app store (RSA Identity G&L on the App Store )
You can also use email replies if you need.
We also have this partner solution: Securience Access Anywhere - Summary
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.