Identity Correlation - Three Methods of Identity Correlation Project Delivery

Three Methods of Identity Correlation Project Delivery

Identity correlation solutions can be implemented under three distinct delivery models. These delivery methodologies are designed to offer a solution that is flexible enough to correspond to various budget and staffing requirements, as well as meet both short and/or long-term project goals and initiatives.

Software Purchase – This is the classic Software Purchase model where an organization purchases a software license and runs the software within its own hardware infrastructure.

  • Training is available and recommended
  • Installation Services are optional

Identity Correlation as a Service (ICAS) – ICAS is a subscription-based service where a client connects to a secure infrastructure to load and run correlation activities. This offering provides full functionality offered by the identity correlation solution without owning and maintaining hardware and related support staff.

Turn-Key Identity Correlation – A Turn-key methodology requires a client to contract with and provide data to a solutions vendor to perform the required identity correlation activities. Once completed, the solutions vendor will return correlated data, identify mismatches, and provide data integrity reports.

Validation activities will still require some direct feedback from individuals within the organization who understand the state of the organizational user base from an enterprise-wide viewpoint, as well as those individuals within the organization who are familiar with each system-specific user base. In addition, some validation activities might require direct feedback from individuals within the user base itself.

A Turn-Key solution can be performed as a single one-time activity or monthly, quarterly, or even as part of an organization’s annual validation activities. Additional services are available, such as:

  • Email Campaigns to help resolve data discrepancies
  • Consolidated or merged list generation

Read more about this topic:  Identity Correlation

Famous quotes containing the words methods, identity, project and/or delivery:

    A writer who writes, “I am alone” ... can be considered rather comical. It is comical for a man to recognize his solitude by addressing a reader and by using methods that prevent the individual from being alone. The word alone is just as general as the word bread. To pronounce it is to summon to oneself the presence of everything the word excludes.
    Maurice Blanchot (b. 1907)

    An identity would seem to be arrived at by the way in which the person faces and uses his experience.
    James Baldwin (1924–1987)

    She cannot love,
    Nor take no shape nor project of affection,
    She is so self-endeared.
    William Shakespeare (1564–1616)

    There was no speculation so promising, or at the same time so praisworthy, as the United Metropolitan Improved Hot Muffin and Crumpet Baking and Punctual Delivery Company.
    Charles Dickens (1812–1870)