Let's Get
Started
Let us show you how Omada can enable your business.
• Full-featured IGA
• Configurability without code
• Best-practice framework for solution design and deployment
• High degree of configurability
• Intelligent compliance
• Manage identities and access across hybrid platforms
• Support at every step of your IGA journey
• Personalized service package to accelerate your deployment
• Avoid common pitfalls and get value in 12 weeks
• Iterative implementation roadmap
• Standardized, well-documented best practices
• Support from Omada-certified project managers, architects, and consultants
• Stellar Customer Success Team
• Quick and professional Service Desk
• Access to ITSM system and KPI reports
• Digital self-paced and instructor-led courses
• Training on demand through our Premier Academy subscription
• Individual, role-based learning plans and certification paths
• Ensure fast and successful IGA deployment
• 5-step process with clear exit criteria
• 12 weeks time to value
• Helps support enterprise IT security
• Makes it easier to meet compliance mandates
• Automates access provisioning and enables the workforce from day 1
• Automated access provisioning and deprovisioning
• Least privilege and separation of duties policies
• Simple-to-run certification campaigns
• Access compliance status dashboards
• Cross-system certification campaigns
• 50+ audit report templates
• Identity lifecycle management
• Automatic access provisioning
• Self-service access requests
Omada provides Governance for Identity Fabric ensuring compliance regulations are met, security and efficiency around identity workflows are maintained.
A definite guide to Identity Governance and
Administration best practices. Learn how to
successfully deploy and maintain an IGA solution.
In this Guide, Gartner has identified Omada as a
Representative Vendor in IGA. Use it to evaluate top
Identity Governance vendors and anticipate future
trends, features, and capabilities in the IGA market.
Familiarize yourself with the typical threats that
can derail a seamless legacy to cloud migration of
IGA functionality and get tips on managing them.
As part of their digital transformation, DEKRA moved
from an in-house access management solution to
a modern, cloud based Omada IGA solution.
Get practical examples and data proving the
value of IGA and learn the five key reasons you
must make it a business imperative today.
Explore our white papers on compliance, security, and
efficiency topics. Gain insights and best practices to drive
informed decisions and enhance your organizational strategy.
We are constantly adding new features to Omada
products to ensure your IGA efforts keep pace with
the ever-evolving threat landscape.
Get information about the newest Omada product
features, benefits, and use cases to ensure you get
the most from your IGA program.
Participate in interactive product demos covering
capabilities such as Delegate Access, Request
Access, Approve Access Request, and more.
Get the latest IGA trends, information, and intelligence
from renowned industry experts in Omada’s live and
on-demand webinar presentations.
A market-leading provider of identity governance
and administration solutions. Get to know us better!
At Omada, efficient teamwork creates extraordinary results.
We enable talented people to create career paths where
they can thrive, be inspired, and have fun.
Omada partners provide unmatched advisory, product
and service re-sale, and project delivery resulting in
unsurpassed customer satisfaction scores.
Don’t just take our word about the value of Omada
solutions. See what actual users think.
See what the media are reporting about our
innovative identity governance solutions.
We frequently deliver expert presentations, exhibit, and
run demos at the world’s leading security and IGA events.
Look at our upcoming schedule to see if we cross paths –
we'd love to speak with you.
Omada is a winner for a third consecutive year in the 7th
annual CyberSecurity Breakthrough Awards program.
Omada is a global market leader in Identity Governance.
Please reach out to us with questions or to get more information.
• Full-featured IGA
• Configurability without code
• Best-practice framework for solution design and deployment
• High degree of configurability
• Intelligent compliance
• Manage identities and access across hybrid platforms
• Support at every step of your IGA journey
• Personalized service package to accelerate your deployment
• Avoid common pitfalls and get value in 12 weeks
• Iterative implementation roadmap
• Standardized, well-documented best practices
• Support from Omada-certified project managers, architects, and consultants
• Stellar Customer Success Team
• Quick and professional Service Desk
• Access to ITSM system and KPI reports
• Digital self-paced and instructor-led courses
• Training on demand through our Premier Academy subscription
• Individual, role-based learning plans and certification paths
• Ensure fast and successful IGA deployment
• 5-step process with clear exit criteria
• 12 weeks time to value
• Helps support enterprise IT security
• Makes it easier to meet compliance mandates
• Automates access provisioning and enables the workforce from day 1
• Automated access provisioning and deprovisioning
• Least privilege and separation of duties policies
• Simple-to-run certification campaigns
• Access compliance status dashboards
• Cross-system certification campaigns
• 50+ audit report templates
• Identity lifecycle management
• Automatic access provisioning
• Self-service access requests
Omada provides Governance for Identity Fabric ensuring compliance regulations are met, security and efficiency around identity workflows are maintained.
A definite guide to Identity Governance and
Administration best practices. Learn how to
successfully deploy and maintain an IGA solution.
In this Guide, Gartner has identified Omada as a
Representative Vendor in IGA. Use it to evaluate top
Identity Governance vendors and anticipate future
trends, features, and capabilities in the IGA market.
Familiarize yourself with the typical threats that
can derail a seamless legacy to cloud migration of
IGA functionality and get tips on managing them.
As part of their digital transformation, DEKRA moved
from an in-house access management solution to
a modern, cloud based Omada IGA solution.
Get practical examples and data proving the
value of IGA and learn the five key reasons you
must make it a business imperative today.
Explore our white papers on compliance, security, and
efficiency topics. Gain insights and best practices to drive
informed decisions and enhance your organizational strategy.
We are constantly adding new features to Omada
products to ensure your IGA efforts keep pace with
the ever-evolving threat landscape.
Get information about the newest Omada product
features, benefits, and use cases to ensure you get
the most from your IGA program.
Participate in interactive product demos covering
capabilities such as Delegate Access, Request
Access, Approve Access Request, and more.
Get the latest IGA trends, information, and intelligence
from renowned industry experts in Omada’s live and
on-demand webinar presentations.
A market-leading provider of identity governance
and administration solutions. Get to know us better!
At Omada, efficient teamwork creates extraordinary results.
We enable talented people to create career paths where
they can thrive, be inspired, and have fun.
Omada partners provide unmatched advisory, product
and service re-sale, and project delivery resulting in
unsurpassed customer satisfaction scores.
Don’t just take our word about the value of Omada
solutions. See what actual users think.
See what the media are reporting about our
innovative identity governance solutions.
We frequently deliver expert presentations, exhibit, and
run demos at the world’s leading security and IGA events.
Look at our upcoming schedule to see if we cross paths –
we'd love to speak with you.
Omada is a winner for a third consecutive year in the 7th
annual CyberSecurity Breakthrough Awards program.
Omada is a global market leader in Identity Governance.
Please reach out to us with questions or to get more information.
Home / Identity Governance Case Studies / Telenor Norway Chooses Omada
COUNTRY
Norway
INDUSTRY
Telecommunication
SOLUTION
Omada Identity Cloud
Telenor was looking for a modern in-house solution for Identity Governance and Access Management (IGA) to improve their day-to-day operations across the organization, enhance their security posture, and meet various compliance mandates.
Telenor has been modernizing their business and working towards automating processes to free up resources wherever they can. The organization is split up into various business units across multiple geographies, which over time created data siloes and a lack of transparency, which became a primary driver for them seeking out a modern approach to how they manage, secure, and enable their workforce. Having centralized solutions that were able to be counted as a single source of truth, providing insights throughout the organization was critical. Telenor also had requirements to comply with various standard-based security and privacy requirements from the Norwegian Security Act, SOX, GDPR, and more. Specifically, the Norwegian Security Act drove the need for Telenor to know who has access to their various systems and keep control over those who had access to critical financial systems. Telenor had many orphan accounts that they could not keep track of.
“As someone coming from the Java world where connectors are all JCA connectors, it is refreshing to see that Omada provides pre-installed and configured connectors.”
– Johan Lundstrøm, IAM Architect, Telenor.
Telenor chose Omada to support them with their business requirements for security improvement, risk mitigation, and compliance by looking to a standards-driven approach to IGA so as to avoid over-customization. They looked to Omada Identity primarily to aid in the following initiatives:
“Unlike other IGA solutions that have serious flaws in data models, Omada has a flexible and changeable data model that allows Telenor to do a meta-model on top of applications/systems that have more than one system supporting it.“
– Johan Lundstrøm, IAM Architect, Telenor
As part of the IGA process, to get a handle on who had access to which applications, Telenor built over 230 integrations to over 300 applications and various systems to import data and got an overview of the access rights within Omada. With Omada’s superior data modeling, Telenor was able to create metamodels on top of their applications and systems and eliminate hundreds of previously orphaned accounts by either deleting them or assigning an owner.
Telenor also gradually added service accounts and created technical identities, owners, and mapped the orphan accounts to manage service accounts, robot accounts, and shared accounts. Today, there are 12 assignment roles that provisions to one system. The team is now identifying roles and creating rule-based provisioning by introducing role modeling and mining. The ultimate goal is to offer an automated single self-service portal for requesting access and Telenor is working steadily towards this end. An Omada to ServiceNow integration is in the works and is being tested by the team. They are also looking into standardizing account management by managing applications in Active Directory.
Omada has also helped simplify the preparation process for compliance-related audits. Telenor managers now have access to a tool for audit that enables them to export lists of invalid accounts that need to be removed as well as comprehensive data that can be easily summoned to present to auditors. Before Omada, these audits used to require huge amounts of person-hours to pull Excel files, but now the audit preparation process is simplified.
“We were very happy with the good communication and cooperation we received from Omada’s entire team, that are critical for a project like IGA.”
– Torbjørn Torp, Senior Project Manager, Telenor.
Since implementing Omada, Telenor has been able to eliminate hundreds of orphaned accounts, gain complete visibility into who had access to what, enable employees or contractors to now easily request and get access to devices and applications quicker, and better prepare for audits.
As a result of their deployment of Omada Identity, Telenor was able to minimize tedious tasks for business users and administrators, improve their security posture by eliminating orphaned accounts, and be better prepared and positioned to meet the continually changing demands of compliance mandates.
Telenor is a Norwegian telecommunications company across the Nordics and Asia. Telenor is headquartered in Fornebu, Norway and has 188 million global subscribers across 9 markets and connects people to what matters most. Connectivity has been Telenor’s domain for more than 165 years, and is listed on the Oslo Stock Exchange under the ticker TEL.