Category Archives: Access Intelligence

Enhanced IAM security with Access Intelligence at Millennium bank

IAM for banking at Millennium iam

IAM for banking at Millennium

The largest listed Portuguese bank Millennium bcp expands the coverage of its Identity and Access Management system (IAM) to include core banking applications and deploys Beta Systems’ risk-driven governance solution.

Millennium bcp is Portugal’s largest listed bank, with a prominent position in the financial market in Portugal. It is the second-largest Bank overall and the first listed banking institution in terms of market share – both in loans to customers and in total customer funds – with an impressive distribution network, made up of a total of 695 branches at the end of 2014. It is also a reference institution in Europe and Africa, through its banking operations in Poland, Mozambique, Angola and Switzerland. All these operations trade under the Millennium brand.

Tags: | |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite

Beta Systems solutions got Access Governance Award

Beta Systems solutions got Access Governance Award

The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project based on Beta Systems’ IAM suite. The project is focusing on realizing a modern, workflow-structured and role-based IAM system that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

IAM data historization – a compliance necessity

With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Permission Path Analysis based on Access Intelligence

Many organisations have a heterogeneous system landscape which uses a number of different access right concepts. The goal of all these concepts is to provide users with those access rights on resources they need to fulfil their work. Based on the high number of users and resources to protect in large organisations, the administration of these access rights can be quite complex and time consuming. Here access intelligence comes into the play.

Tags: | |
Detlef Sturm
Senior System Architect Detlef Sturm is a Senior System Architect at Beta Systems Software AG with 20+ years’ experience in design and practice of system and software architectures. In addition to the technological aspects, he was significantly involved in drafting the strategic positioning of Access Governance in the IAM area. As Part of this strategy he took over the responsibility for design, architecture and development of the Access Intelligence product. He has built up extensive knowledge in BI technologies in particular based on the SQL server. In addition to the focus of the multidimensional design of data warehouse systems, it also deals with applications of analytics for IAM. These include the analysis of permission structures regarding relationships, history and risk. Even his physical fitness is given enough attention by regular jogging and biking. His best time in the marathon is currently 3:34 hours.