Category Archives: Access Risk Management

Preparing for the EU GDPR by identifying potential user access risks

Reports and multi-dimensional analyses using the Access Intelligence Manager for GDPR purposes

Access Intelligence Management for GDPR Compliance

Access Intelligence Management for GDPR Compliance

The analyses and reports deliver the whole spectrum of security-relevant information, such as number of roles, groups, accounts or target systems per user including historical analyses of access rights. Dedicated dashboards providing weighted data and key risk indicators allow staff to perform targeted follow-up measures.

Risk-based access intelligence methods can uncover critical security gaps and thus help prevent any form of data misuse. The solution offers automatic support throughout all stages of access risk management – from assessment and analysis through to monitoring and risk control, thereby being an important tool for ensuring compliance with the principles of GDPR.

Tags:
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Order our free ticket now: Beta Systems at it-sa 2015

Optimizing IT Security Processes with IAM from Beta Systems

it-sa Beta SystemsAt this year’s it-sa show, taking place in Nuremberg from 6-8 October 2015, we will be showcasing our extensive range of new identity and access management (IAM) features. In Hall 12.0 on booth 614, Beta Systems will give visitors the opportunity to experience live demonstrations of the Garancy Recertification Center and the Garancy Time Traveler.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

New Beta Systems Product: The Garancy Recertification Center!

Brand-new: Portal based Recertification of Access Rights

We are pleased to announce our new Garancy Recertification Center. It is a portal-based solution for the recertification of access rights. Companies can now run review campaigns of the users’ access rights, assigning the manager to recertify or revoke their entitlements, thereby increasing the security and accuracy of recertifications and making the recertification process auditable and compliant.

Review Access Rights

Garancy Recertification Center

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

How to identify and measure IT access risks

IT Risk Identification with Access Intelligence – Why you can’t do without it

Before access risks can be avoided, reduced or managed, they must first be identified. While this may seem trivial, it is a complex task in terms of permission management. Detecting and assessing risks among the enormous amounts of data that continuously accrue in the access management environment is a lot like finding the proverbial needle in the haystack. With a growing number of users, roles and IT systems – all of which must be granted permissions – the sheer number of risk opportunities rises exponentially.

A company with 5,000 employees and only 50 IT systems with ten permission groups each, for example, has over 2.5 million permission-granting possibilities, each of which may represent a high or low risk for the company. In light of this, the task of identifying all the existing risks from these permissions, assessing their effects and defining appropriate measures seems hopeless.

Tags: |
Stefanie Pfau
Product Manager IAM Stefanie has been working in the IT sector for 15 years and started as project manager for complex software projects for hospitals. From these very complex but more standardized healthcare projects, she moved to the retail industry with more international software projects meeting different international legal requirements and the fufilment of customer specific software solutions based on standard software. With her quick uptake, above average commitment, and analytical ability to see through complex situations, she took over responsibility for the technical product management at Beta Systems. With her proven track record and her excellent attention to detail and follow through she is a very strong asset for our IAM strategy development. Stefanie understands core business objectives, and translates them into excellent product solutions by creating detailed functional specifications for use by both technical and non-technical readers.