Category Archives: Access Risk Management

Investigate and track access right changes with Garancy Time Traveler

Better protection against insider attacks

Garancy Time Traveler

Benefits of the Garancy Time Traveler

With the release of Garancy Access Intelligence Manager 2.1., we will offer a new add-on, the Garancy Time Traveler. The solution enables companies to analyze all changes to access rights for corporate data and applications at any time. As it continuously logs all changes to access rights, the Garancy Time Traveler allows users to check access rights for any point in time and within any timeframe.

This enables them to detect potential risks in good time and prevent them impacting the business. Using the Garancy Time Traveler helps companies to significantly reduce the risk of fraud and data theft by insiders. However, should a case of fraud or data breach occur, the tool includes extensively detailed forensic analyses with which users can pinpoint its source.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

IAM data historization – a compliance necessity

With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Planning an Access Risk Management System

Sample of Analysis

Sample of Analysis

Managing access permissions is an increasingly important part of successful risk management. The potential risk to corporate IT increases with every access authorization and every user account. When people dealing with risk management include permission structures in their work, they can significantly reduce IT risk potential and therefore strategic and operational risk too.

So what do you need to consider when planning, implementing and deploying an access risk management system.

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.