Shortly before our break, we come to the first virtual award and this award is about the category best enterprise IM project. And we had a, a lot of great project and great project applications. But of course there's always only one winner, which we're choosing by our group of independent analysts. And I would like to introduce the head of our Analyst and go back to Martin, ER, hi Martin. Hi
Transfer.
Just before we go into that project and announce the winner. I have some question about that whole process for you.
The first one is which role does enterprise IM play in connection with our event, topic, identity fabric and the future of identity management?
Yeah. So I've talked about it in my keynote and said they are, I fabrics must serve all types of identities, but apparently this means it also must serve the employees. And a lot of enterprise IM is not really just employees. It's reaching out to partners, it's grinding out. And so it is part of the entire story and you need to be strong in that part as well. And as I've said, enterprise IM can go well beyond just the employee.
We shouldn't say enterprise equals employee. This is more
Correct. What type of project qualities for the category enterprise am or more what makes a project outstanding to win?
Yes. So basically enterprise IM project must have a sort of a enterprise focus. So employees, partner, stuff like that. When I look at what qualifies a project, what makes a project outstanding, there are various characteristics, there is innovativeness. So doing things differently, doing modern, taking a modern deployment approach or solving very complex challenges.
So hundreds of applications in a reasonably short period of time. So things like that are what really make project outstanding. Usually it's a combination of, of different factors which come together.
Okay. Sounds interesting. So we are now curious what you are telling us about the winner and the project.
Yeah.
So what, what can I tell you about this project? It is function, which qualifies to look at everything I said, not easy because many applications, a lot of legacy to integrate, to move forward efficiently, done very well sought out. I believe also from the approach taken. So really modernizing a lot, which was done. And so doing these things really at scale and shifting it into a modern, as a service deployment, that is what basically makes this project outstanding. And I think with that, we are moving to naming the winner China for correct? Correct. Yeah.
So we have this winner, you've seen it. It is Siemens. And we have, I'm happy to, sorry. I think the names are not exactly correct to talk with di Bensky of Siemens. Welcome Dimitri.
Thank you. Thank you for welcoming me
And congratulations for your project. You did an outstanding trip, I believe from what I know about this project. So maybe tell us a little bit of about what you basically did this project and what the key objectives were.
Yeah. So you can imagine we had already authentication system since 15 years authenticating our employees.
However, it got simply not that innovative anymore. And we had lots of missing capabilities and the topics we had to work on. And we decided with a, within the company that we will completely retrofit and replace this system. And by that we really approached all the aspects, starting with the operational model, with the software with way how we let's say operate and run this and did really everything from scratch. And considering that fact, we also, where it was clear that we have to migrate more than thousand applications and aware very short period of time.
And all that aspect had been addressed within the projects. And currently we are in the migration phase and it works like the planned that, but it, as an overall picture, we had to tackle down the whole story from the very beginning, from the, let's say, software operations selecting the right partner to do it still let's say performing the migration in the workshop time,
Maybe you could elaborate a little on the types of applications you had to serve. So from what I understand, it's ranging from really good, old, very mature legacy to modern size. So the full range.
Yeah.
That's exactly the case here. So we had in the past lots of applications, which were header based authenticated. So this applications were not talking modern authentication protocols. And we decided not to change that because considering the account of this application, like three or 400, it's it, it wouldn't be possible to change the code. Sometimes you cannot even find the person who developed that for 15 years. So we had to find an approach to support these legacy applications as well.
While having that, we had also lots of modern applications having full support of open ID connect and some modern protocols. And we had to offer this support also in our new service.
And, and when we, when we take a look at the, the deployment model, you management, thinking about every single deployment model operating model, what has changed here?
Yeah.
First of all, we know that the whole operation model in lots of companies changing, and we are all looking towards the cloud technologies by that, because obviously we have to provide a, a good cybersecurity Ando, resiliency availability across the globe and all that aspects, which is pretty hard to implement if operating on the premises, having that said, we have also other aspects like data privacy and security, which we had to consider as well handling, let's say the date of our employees.
And we decided to get the best of both worlds using the cloud technology to operate the identity provider in a very modern way, using the containerized approach and the platform operated in AWS while having let's say the connection to our active directory data on premises in the special way. So we let's say keep the data on premises while we can operate the whole authentication solution in the cloud. And also we are capable to secure, let's say critical certificate information using HSM cloud module.
So we actually getting everything we can from both the worlds and building, let's say the very modern way of operating something we are required to go forward. Yeah.
And, and if you look at that project, what would you rate as the one or two main earnings you'd like to share with others?
Yeah. So if someone is deciding to retrofit their authentication system, it's extremely important to have a mandate within the company. So this sort of project should be really set as a key or major initiative with the company with a very good and strong management support, because otherwise it will take pretty long time to get the whole migration done. Second thing is you require a very reliable partner who knows how to operate this sort of solutions.
We are glad to have ICC on board, which the company which help us to let's say, implement and tailor this solution for our needs. And maybe last, last button, at least try to make this, let's put it this way a bit boring, topic of authentication, switch it to excite the people, build a community around offer lots of help offer. Let's say capabilities for the people to integrate their applications by their own. So they're excited about the new way. How do you, how you deal with that, and that will be possible.
Okay.
Dimitri, would you like to add anything?
First of all, I would like to thank you for this art. It's really great recognition for us for, let's say this one and a half year of very, very hard work. I would like to thank also our partner ICC, who helped us to deliver this solution and tailor that to our needs and yeah, many thanks to the whole, my team, internal and external and enjoy the moment.
Thank you. And congratulations again also to all your, of your team. Great job done.
Thank you.
Yeah. Thank you all for my side.
Thank you, Martin. Congratulations to Siemens and yes, we go to the next point, we go to the lunch break. So take a break, take a coffee chat in the app.
Interact, ask to participate in pulse. Download the last presentation. Look at the future points. And we are back here at 1240. See you later.