What you should know about authorization management

what you should know about header
Comments Off on What you should know about authorization management

Many companies are subject to strict regulatory requirements.

The topic of authorization management is important in almost all requirements.

To ensure that these requirements are met, companies must be audited externally or by their own auditors!

Here it is helpful to present targeted Audit analyses in order to be able to fulfil a fast data delivery within the scope of an audit and thus to be able to prove compliance with the right requirements.

In order to be able to meet the goals and requirements of authorization management, technical support is advantageous, but the purchase of a tool alone is not sufficient. Added to this is the complexity of authorization management:

Screenshot_2019-11-14-What-You-Should-Know-about-Your-AuthorizationManagement-Whitepaper-EN-BF-WP-AccessManagement-KP…

In addition to complexity, further problem areas arise

Our partner KMPG has to deal with a number of errors and problems during external or internal audits, for example:

  • Intransparency of the assigned or required authorizations (e.g. missing reporting options or quality of the authorization descriptions)
  • Intransparency on “legalizations” (applications / releases not comprehensible
  • Overrights (e.g. “trainee effect” or in relation to privileged accounts)
  • No periodic quality assurance (“recertification”)
  •  Lack of acceptance of responsibility
  • Failure and waiting times for IT systems
  • Dealing with www authorizations (e.g. regarding information owners, entry in CMDB)
  • Overloading of the service desk due to increasing diversity of the application landscape and the repetitive standard queries
  • Overview of external employees/service providers and their access to company data not available/incomplete
  • Authorizations not organized according to business functions, no role model available

What do?

Together with our partner KMPG, we have compiled a free white paper which shows how these regulatory requirements have been implemented and helps you to cope with the complexity of authorization management and compliance, security and efficiency. Here you can download it for free.

No Tags given

3 new versions of the Garancy IAM Suite available

Posted by · filed under Allgemein

  • Garancy IDM 2.2 VP3
  • Garancy RCC, USC, IPR 2.3 VP3
  • Garancy AIM 2.2 VP2

The new versions provide a lot of new features and values for customers, here are some highlights:

  • The old iPR function has been taken over into the Garancy Portal. IPR is now available with a modern UI and with various improvements.
  • New process for the User Center “Emergency Employee Suspension”
  • Employee Transfer based on the HR data import of IDM, the system will create a Employee Transfer request automatically
  • New widgets provided by AIM and displayed within the RCC or USC
  • In preparation of Java 11 a 64-bit version of the uConnect Agent for Windows is now available
  • IDM documentation improvements. The documentation has been restructured and the user manual and a new concepts manual are now available in German


The software packages and the product documentation can be downloaded from the Customer Portal. More details are available within the change logs.

No Tags given

IAM for insurance companies

On average, internal users in insurance companies work with more 20 IT applications and distinct data stores while external business partners use up to 10 applications with access to the insurers’ data. But do you know for sure who controls the access to the data and who represents the biggest risk? And why?

Protect  the sensitive data of insurance companies from unauthorized access!

Why IAM for insurance companies is so importantInsurance companies operate in a rapidly growing but highly competitive market providing efficient and compliant services. To safeguard reputation, revenue and retention rates, the insurer must ensure customers are fully satisfied with its services and that their data is 100% protected.

But there are lots of threats to the security of data within the insurance industry due to unauthorized access to critical data of customers by cyberattacks, hacker attacks or a misuse by insiders.

Identity Management for Financial Services

Identity Management for Financial Services

Protect sensitive information, data and systems from unauthorized access!

The growing threat of data abuse and theft as well as ever-more complex legal regulations make Identity Management for Financial Services a must-have tool for businesses operating in the financial sector.

The GARANCY IAM of Beta Systems suite protects the business-critical information, data and applications of financial service companies from unsanctioned access. Each employee can only access the data required to perform the given task at hand. At the same time, the IAM suite delivers forward-looking options for supporting the digital transformation of companies.

The GARANCY IAM suite provides powerful Identity Management for Financial Services based on standardized best-practice processes in the banking sector, which are designed to improve data security, lower operating costs, reduce risk relating to data access and introduce efficient audit-compliant processes that ensure compliance with all legal regulations.