Jack Henry & Associates, Inc. JHA Client Services ConsultingSM SilverLake Global … client...

Post on 27-Apr-2020

5 views 0 download

Transcript of Jack Henry & Associates, Inc. JHA Client Services ConsultingSM SilverLake Global … client...

© 2019 Jack Henry & Associates, Inc.®1 © 2019 Jack Henry & Associates, Inc.®

JHA Client Services ConsultingSM – SilverLake®

Global Security

Donna England

April 17, 2019

Jack Henry & Associates, Inc.®

© 2019 Jack Henry & Associates, Inc.®2

Legal Disclaimer: Dates contained in this presentation are

provided as estimates only and can be changed at any time

at the sole discretion of Jack Henry & Associates, Inc. This

information may not be incorporated into any contract and

should not be relied upon in making purchasing decisions.

© 2019 Jack Henry & Associates, Inc.®3

Agenda

• Introductions

• What is Global Security

• Global Security Advantages

• Why Engage Client Services

• Global Security Implementation Process

• Global Security Additional Offerings

© 2019 Jack Henry & Associates, Inc.®4

Donna England brings almost 39 years of wide-ranging experience to her role as a Consulting Services Manager. Donna is one of

the founding consultants with Intellix, which was merged into the JHA Client Services Consulting group in 2015.

Her career in financial services began in a profitable, community-based financial institution where she oversaw the accounting

and audit functions. After being involved in several system implementation or conversion projects, she moved to the technology

sides of the business, joining Broadway & Seymour (later purchased by JHA) in 1991. She began as a business analyst in the

Installation department, directing the mapping and conversion of customer data for both deposit and loan applications on the

Liberty system. She then moved to customer support, eventually managing the level two support team and working closely with

R&D in the role of business analyst.

After JHA acquired the Liberty product, England moved back to the Installation group, working with CIF 20/20® Outlink banks,

managing the training and programmer groups. Training bank users on the system, responding to unique customer requests, and

trouble-shooting implementation issues established the strong foundation she draws on to originate the system-based solutions

she currently delivers to JHA Client Services Consulting clients.

Donna currently lives in Lexington, North Carolina with her husband Hugh and two dogs Jazz and Gracie.

Donna England

Consulting Services Manager

JHA Client Services ConsultingSM

© 2019 Jack Henry & Associates, Inc.®5

What is Global Security

• Global Security is an alternative way to set up user

access within SilverLake®

– Template-based functionality

• Allows for role or group defined access

• Locks down SilverLake® more efficiently

• Allows the use of standard SilverLake ® menus

– Improved reporting capabilities

© 2019 Jack Henry & Associates, Inc.®6

Global Security Advantages

• Allows for a role-based system

– Templates help to ensure consistent access

© 2019 Jack Henry & Associates, Inc.®7

Global Security Advantages

• Allows for a role-based system

– Templates help to ensure consistent access

– Streamlines onboarding process and user maintenance

© 2019 Jack Henry & Associates, Inc.®8

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

– Identify and remove unneeded access

© 2019 Jack Henry & Associates, Inc.®9

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

– Identify and remove unneeded access

– Helps managers look at what is truly needed for each role

© 2019 Jack Henry & Associates, Inc.®10

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

– Identify and remove unneeded access

– Helps managers look at what is truly needed for each role

– Review for necessary segregation of duties, internal controls

© 2019 Jack Henry & Associates, Inc.®11

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

• Reduces risk in Xperience

– Easier to identify excess access

© 2019 Jack Henry & Associates, Inc.®12

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

• Reduces risk in Xperience

– Easier to identify excess access

– Streamlines navigation

© 2019 Jack Henry & Associates, Inc.®13

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

• Reduces risk in Xperience

• Reduces overhead of maintaining custom menus

– Standard menus can be used without risking excess access

© 2019 Jack Henry & Associates, Inc.®14

Global Security Advantages

• Allows for a role-based system

• Rebuilding access allows for a thorough review

• Reduces risk in Xperience

• Reduces overhead of maintaining custom menus

• Simplifies reporting needed for review and approval of

user access

– Standard reports easier to understand for managers, auditors,

examiners

© 2019 Jack Henry & Associates, Inc.®15

Why Should I Engage Client Services?

• It can be challenging to get accurate and timely

information from all bank departments.

© 2019 Jack Henry & Associates, Inc.®16

Why Should I Engage Client Services?

• It can be challenging to get accurate and timely

information from all bank departments.

• It can be time-consuming to map existing user access to

role-based access using SilverLake® menus.

© 2019 Jack Henry & Associates, Inc.®17

Why Should I Engage Client Services?

• It can be challenging to get accurate and timely

information from all bank departments.

• It can be time-consuming to map existing user access to

role-based access using SilverLake® menus.

• Resource constraints make it difficult to complete a

project of this magnitude, while regulatory and audit

pressures make it a high-priority project.

© 2019 Jack Henry & Associates, Inc.®18

Why Should I Engage Client Services?

• It can be challenging to get accurate and timely

information from all bank departments.

• It can be time-consuming to map existing user access to

role-based access using SilverLake® menus.

• Resource constraints make it difficult to complete a

project of this magnitude, while regulatory and audit

pressures make it a high-priority project.

• Client Services builds your system ‘from scratch’.

© 2019 Jack Henry & Associates, Inc.®19

What Does The Process Look Like?

Project phases

• Kickoff

• Discovery

• Build

• Test

• Live

© 2019 Jack Henry & Associates, Inc.®20

Global Security Process

• Kickoff

– Approximately six weeks prior to initial onsite visit

– Call with Bank’s project team to discuss

• High level project plan

• Questions arising from RFI responses

• Verify onsite dates

• Discuss departmental homework questionnaire

• Answer any questions the Bank may have

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®21

Global Security Process

• Discovery phase

– Consultant(s) come onsite

• Interview Department managers or Role owners

– Define roles needed within each department or group

– Determine necessary system access based on role definition and

actual system usage

– Use Least Privileged Access concept

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®22

Global Security Process

• Discovery phase

– Consultant(s) come onsite

• Interview Department managers or Role owners

• Discuss existing or desired use of SilverLake ® security features for

– Wire Security

– General Ledger Security

– EIP (NSF) Limits

– SSN/TIN Masking

– Insider and Dormant Access

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®23

Global Security Process

• Discovery phase

– Consultant(s) come onsite

• Interview Department managers or Role owners

• Discuss existing or desired use of SilverLake® security features

• Timing

– One to three consultants onsite for three days

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®24

Global Security Process

• Build phase

– Consultant(s) work remotely to

• Build the necessary Global Security templates

– Six required templates

» Profile

» Product

» Insider Code

» Security

» Core Applications

» Menu Options

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®25

Global Security Process

• Build phase

– Consultant(s) work remotely to

• Build all the necessary Global Security templates

• Create Template Groupings and Group IDs

– Based on roles defined during Discovery interviews

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®26

Global Security Process

• Build phase

– Consultant(s) work remotely to

• Build all the necessary Global Security templates

• Create Template Groupings and Group IDs

• Build User IDs for existing users

– Can build User IDs without disrupting current MENUMENU access

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®27

Global Security Process

• Build phase

– Consultant(s) work remotely to

• Build all the necessary Global Security templates

• Create Template Groupings and Group IDs

• Build User IDs for existing users

• Timing

– Elapsed time of one to three weeks

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®28

Global Security Process

• Test phase

– Consultant(s) come onsite

• Conduct training sessions for users selected as Early Adopters

– make sure they have access to (and can find) all the menu options

necessary to perform their assigned functions

– become comfortable with the navigation to provide assistance to others

in the group during live phase

• Make modifications to templates to address any issues identified by

Early Adopter users

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®29

Global Security Process

• Test phase– Consultant(s) come onsite

• Conduct training sessions for users selected as Early Adopters

• Make modifications to templates to address any issues identified by Early Adopter users

• Conduct training for System Administrators

– How to support existing users

– How to add new users

– How to create new and change existing templates

– How to create new and change groupings

– How to generate system reports for user access

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®30

Global Security Process

• Test phase

– Consultant(s) come onsite

• Conduct training sessions for users selected as Early Adopters

• Make modifications to templates to address any issues identified by

Early Adopter users

• Conduct training for System Administrators

• Timing

– One or two consultants onsite for three days

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®31

Global Security Process

• Live phase

– Consultant(s) work remotely to activate remaining users

– Assist system administrators with any additional changes as

identified by users

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®32

Global Security Process

• Live phase

– Consultant(s) work remotely to activate remaining users

– Assist system administrators with any additional changes as

identified by users

– Timing

• Up to one week

• InterviewDiscovery

Needed AccessBuild

• Early AdoptersTest Live

© 2019 Jack Henry & Associates, Inc.®33

• Onsite consulting

– Two or three days onsite

– Work with system administrators

• Deep dive into six required templates

• Design system configuration

• Build templates, groupings, users as time allows

• Discuss rollout plan

Global Security Additional Services

© 2019 Jack Henry & Associates, Inc.®34

• WebEx consulting

– Four to eight hours

– Work with system administrators

• Deep dive into six required templates

• Discuss system configuration

• Answer specific questions

Global Security Additional Services

© 2019 Jack Henry & Associates, Inc.®35

• Global Security Review

– Global Security already implemented

• Acquisition or reorganization requires new role definitions

• New system administrators

• Converting bank

Global Security Additional Services

© 2019 Jack Henry & Associates, Inc.®36

• Global Security Review

– Discovery interviews with some or all departments

– Existing templates modified or new templates built to define new

or changed roles

– Hands-on training for system administrators

– Changes rolled out to all or select users

Global Security Additional Services

© 2019 Jack Henry & Associates, Inc.®37

Questions?