Password Management Harmonization
Brief :
A leading German-based media company required support in the harmonization of their current diverse password management solutions for privileged credentials towards a centralized environment.
BxC was asked to support this effort from a technical project management perspective and to coordinate the short-term migration of 3 major business areas and regions onto the newly selected platform. Additionally, BxC was asked to design the new organizational structure and required processes to operate the new platform service offered across the global business units.
Activities :
TECHNICAL PROJECT MANAGEMENT AND PROJECT LEAD
BxC restructured the existing agile-only project approach into a hybrid model leveraging comprehensive and project timeline-focused waterfall project planning while enabling agile methodologies whenever possible.
VENDOR MANAGEMENT AND COMMUNICATION
As part of the migration efforts, BxC handled and structured the communication with the new solution provider. This aimed at ensuring adequate support during the migration process, limiting the workload of the client administrative team, and structuring workshops across involved business units to address and proactively inform them about all cross-business unit topics.
ORGANIZATION DESIGN AND IMPLEMENTATION
To facilitate the future operation of the newly established centralized password management infrastructure, BxC designed the future operating model including but not limited to organizational setup, global and business unit specific operations processes for request and user management, roll deception required to operate the established solution, and the identification and onboarding of adequate skills and staffing.
results :
BxC delivered a password management solution on time and within budget. ? Find out how we did it!
More than 40.000 privileged credentials from various tools have been migrated to a central platform with limited impact for the end-users
End-users have been trained to utilize the new central solution and to leverage the newly available features for secure credential handling
An operating model has been established. It can now be easily transferred to additional business units and areas which were initially out of scope