Author Archives: Thomas gr. Osterhues

Thomas gr. Osterhues

About Thomas gr. Osterhues

Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Out now: The new GARANCY Identity Access Management Suite

Beta Systems today unveiled its new Identity Access Management Suite and IAM website

New GARANCY IAM Suite

Beta Systems’ Identity Access Management Suite brings maximum flexibility to dynamic companies.

Today Beta Systems announced the new version of its Identity Access Management Suite. The product family, for the first time presented under the new GARANCY product label, offers many new functions and enhanced integration of the individual components.

For detailed information go to our new identity and access management website, which was also launched today.

Beta Systems IAM – Maximum Flexibility for Dynamic Companies

The updated and improved functions of the GARANCY IAM Suite specifically address the ongoing changes and emerging requirements that affect all corporate areas of the customer base. Altered or upscaled IT landscapes, new legal regulations and increasingly stringent audits as well as changed user and usage profiles pose challenges to modern companies in the wake of key trends such as digital transformation and Industry 4.0.

Tags: | |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

IAM, DAG, PAM: How to break the silos of security tools

IAM; PAM, DAG for Identities

Identity Access Management, PAM, DAG

Between 2009 and 2014, the number of successful attacks on information security increased at an average annual rate of 66%. Bearing in mind that insiders are responsible for two thirds of these attacks, managing users’ access rights with Identity Access Management has become a critical issue taken very seriously by senior management.

A large number of security solutions are now available, offering different value propositions. Identity Access Management (IAM), data access governance (DAG) and privileged account management (PAM) solutions each make their contribution at different levels to controlling access rights. As the common denominator, the user’s identity can be used to de-compartmentalize these solutions, culminating in an integrated security concept. In the following I will describe a framework for using these products based on user identity, and outlines an integrated architecture meeting IT security requirements over the long term.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Visit Beta Systems at the INFOSECURITY EUROPE in London

Infosecurity Europe

Infosecurity Europe

Beta Systems will showcase their risk-driven Identity and Access Management suite at the Infosecurity Europe event which will be held in London on the 7th-9th June, 2016.

It is estimated that between 70-80% of all breaches of corporate information security are due to insiders. However, the right to data access of employees, contractors, partners and customers is one of the biggest vulnerabilities within IT security.

Tags:
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Beta Systems at the European Identity and Cloud Conference in Munich 2016

We will showcase our risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016.

Access Governance Award for Beta Systems

Access Governance Award for Beta Systems at the EIC 2014 and 2015

Our GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to access rights. The browser-based solution for the efficient recertification of access rights enables companies to review the internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. A Password Management module facilitates access to applications and simplifies the enforcement of IT security policies associated to passwords.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.