Leo is Online Marketing Manager at Beta Systems. While his training at MAGIX he found his Passion in OM-Marketing and getting in touch with the Software-Market, strongly focussed on SEO, SEA and Social-Media.
With Sistrix as his best friend and Buffer on his Side, he likes to develop strategies , no pun intend, through day and night. ;)
Leo on LinkedIn
Corona und seine Folgen beschäftigen den öffentlichen Sektor nun schon seit Monaten. Zur Bewältigung der Corona-Pandemie legt die Deutsche Bundesregierung kurzfristig ein „Konjunktur- und Krisenbewältigungspaket“ auf.
Was ist das Ziel?
Ziel ist unter anderem die Verbesserung der digitalen Infrastruktur in Bund, Ländern und Kommunen:
Registermodernisierung in Bund, Ländern und Kommunen
Sofortige Umsetzung von Digitalisierungsvorhaben in der Verwaltung zur Beschleunigung von Prozessen unter Einhaltung von Compliance Vorschriften wie die EU-DSGVO
Zügige und flächendeckende Umsetzung des Online-Zugang-Gesetzes bis Ende 2022, d.h. Verbesserung des Online Zuganges zur Verwaltungsleistungen
Erhöhung der IT-Sicherheit
Um in diesem Bereichen helfen zu können, haben wir konkrete Hilfestellungen für unsere Leser bereit gestellt:
Registermodernisierung und digitale Kundenkontakte
As a replacement this year, we are planning a webcast in English covering Data Center Intelligence (DCI) and Identity Access Governance (IAM) on the original date of 23 April 2020.
Almost every hour there is new, unpleasant news due to the novel corona virus (COVID-19). The health of customers, employees and partners of Beta Systems is our main concern. We would have liked to have held the event as planned from April 22nd to 24th, 2020, especially since we had more registrations than ever before, but due to the current pandemic, we must cancel.
You will find details on registration and the final agenda for the webcast here:
Comments Off on What you should know about access management
companies are subject to strict regulatory requirements.
The topic of access management is important in almost all requirements.
ensure that these requirements are met, companies must be audited externally or
by their own auditors!
Here it is helpful to present targeted Audit analyses in order to be able to fulfil a fast data delivery within the scope of an audit and thus to be able to prove compliance with the right requirements.
In order to be able to meet the goals and requirements of access management, technical support is advantageous, but the purchase of a tool alone is not sufficient. Added to this is the complexity of access management:
In addition to
complexity, further problem areas arise
Our partner KMPG has to deal with a number of
errors and problems during external or internal audits, for example:
of the assigned or required authorizations (e.g. missing reporting options or
quality of the authorization descriptions)
on “legalizations” (applications / releases not comprehensible
(e.g. “trainee effect” or in relation to privileged accounts)
periodic quality assurance (“recertification”)
Lack of acceptance of responsibility
and waiting times for IT systems
with www authorizations (e.g. regarding information owners, entry in CMDB)
of the service desk due to increasing diversity of the application landscape
and the repetitive standard queries
of external employees/service providers and their access to company data not
not organized according to business functions, no role model available
Together with our partner KMPG, we have compiled a free white paper which shows how these regulatory requirements have been implemented and helps you to cope with the complexity of access management and compliance, security and efficiency. Here you can download it for free.