KeyData Engaged to Help the University of Waterloo Migrate from Legacy Identity Management Platform to Best-of-Breed Solution

The University of Waterloo, with over 35,000 students and 2,800 faculty members, was sunsetting their Identity & Access Management solution. The previous solution, running on a framework past end-of-life, had become unstable and had issues with supportability, performance, extensibility, and usability.

The university engaged KeyData Associates to help modernize their IAM program using SailPoint's IdentityIQ product. KeyData's ability to understand and address the university's pain points, using the IdentityIQ product, set them well apart during the RFP process.

Healthcare professional working on a computer.

Highlights

BUILDING A FOUNDATION

KeyData worked closely with the university, building a solution that addressed issues of the past, with an eye to future service expansion. The result is a solution that has significantly boosted the university's IDM service versatility, user experience, and integration potential. The solution has also reduced the need for manual processes, and it has automated and enhanced preventive and detective controls, and increased transparency and visibility. KeyData's robust target state architecture has proven effective and reliable. Batch processes are completed in minutes rather than days.

The next generation IAM solution has proven to be a solid foundation since its launch in the spring of 2019. The University has been able to expand IAM services to the University and its satellite campuses, as well as the affiliated colleges.

AT A GLANCE

  • COMPANY:

    University of Waterloo

  • LOCATION:

    Canada

  • EMPLOYEES:

    2,800 faculty members
    35,000 students

  • CHALLENGE:

    Migration from legacy identity management system to new best of breed solution; deploy a unified IAM framework to support over 55,000 internal users.

  • SOLUTION:

    SailPoint IdentityIQ

  • SERVICES PROVIDED BY KEYDATA:
    • Conducted IAM current state assessment
    • Developed target-state IAM processes
    • Developed IAM target state architecture, strategy, roadmap and implementation plan
    • Managed execution of IAM program
    • Developed business requirements
    • Executed technical design and solution configuration
    • Integration and customization, offpremise cloud and on-premise
    • Developed and deployed training for admins, end-users, developers and operations

Contact Us

Don't know
where to start?

Looking to assess your current state, map out strengths, identify gaps and design a tailored roadmap to an optimal target state IAM program?

Book your complimentary assessment workshop and get started today.

Get Started
KeyData Cyber Logo

Copyright © 2024 KeyData Cyber.
All Rights Reserved.

keydatacyber twitterkeydatacyber facebookkeydata-associates linkedinkeydatacyber instagramKeyData Cyber youtube