Identity Correlation - Three Methods of Identity Correlation Project Delivery

Three Methods of Identity Correlation Project Delivery

Identity correlation solutions can be implemented under three distinct delivery models. These delivery methodologies are designed to offer a solution that is flexible enough to correspond to various budget and staffing requirements, as well as meet both short and/or long-term project goals and initiatives.

Software Purchase – This is the classic Software Purchase model where an organization purchases a software license and runs the software within its own hardware infrastructure.

  • Training is available and recommended
  • Installation Services are optional

Identity Correlation as a Service (ICAS) – ICAS is a subscription-based service where a client connects to a secure infrastructure to load and run correlation activities. This offering provides full functionality offered by the identity correlation solution without owning and maintaining hardware and related support staff.

Turn-Key Identity Correlation – A Turn-key methodology requires a client to contract with and provide data to a solutions vendor to perform the required identity correlation activities. Once completed, the solutions vendor will return correlated data, identify mismatches, and provide data integrity reports.

Validation activities will still require some direct feedback from individuals within the organization who understand the state of the organizational user base from an enterprise-wide viewpoint, as well as those individuals within the organization who are familiar with each system-specific user base. In addition, some validation activities might require direct feedback from individuals within the user base itself.

A Turn-Key solution can be performed as a single one-time activity or monthly, quarterly, or even as part of an organization’s annual validation activities. Additional services are available, such as:

  • Email Campaigns to help resolve data discrepancies
  • Consolidated or merged list generation

Read more about this topic:  Identity Correlation

Famous quotes containing the words methods, identity, project and/or delivery:

    Crime is terribly revealing. Try and vary your methods as you will, your tastes, your habits, your attitude of mind, and your soul is revealed by your actions.
    Agatha Christie (1891–1976)

    Adultery is the vice of equivocation.
    It is not marriage but a mockery of it, a merging that mixes love and dread together like jackstraws. There is no understanding of contentment in adultery.... You belong to each other in what together you’ve made of a third identity that almost immediately cancels your own. There is a law in art that proves it. Two colors are proven complimentary only when forming that most desolate of all colors—neutral gray.
    Alexander Theroux (b. 1940)

    Treat the cow kindly, boys; remember she’s a lady—and a mother.
    —Federal Writers’ Project Of The Wor, U.S. public relief program (1935-1943)

    There was no speculation so promising, or at the same time so praisworthy, as the United Metropolitan Improved Hot Muffin and Crumpet Baking and Punctual Delivery Company.
    Charles Dickens (1812–1870)