Category Archives: Audit Requirements

IAM for Insurance Provider

Comments Off on IAM for Insurance Provider

Insurer gain secure access to all applications – IAM for insurance provider

IAM for insurance provider

IAM for insurance provider

Insurance providers are often businesses with complex, distributed structures are faced with the challenge of managing complex and heterogeneous IT landscapes centrally and effectively, all the while being under extreme pressure to save time and costs. Mergers and acquisitions have further added to this challenge  in recent years. All the thousands of employees require access to a broad range of different software systems depending on their tasks.

Tags: | |

New Beta Systems Product: The Garancy Recertification Center!

Comments Off on New Beta Systems Product: The Garancy Recertification Center!

Brand-new: Portal based Recertification of Access Rights

We are pleased to announce our new Garancy Recertification Center. It is a portal-based solution for the recertification of access rights. Companies can now run review campaigns of the users’ access rights, assigning the manager to recertify or revoke their entitlements, thereby increasing the security and accuracy of recertifications and making the recertification process auditable and compliant.

Review Access Rights

Garancy Recertification Center

Tags: |

Meet Beta Systems at the European Identity and Cloud Conference 2015

Comments Off on Meet Beta Systems at the European Identity and Cloud Conference 2015

Fast Forward and the new Garancy Recertification Center

Garancy Portal

Garancy Portal

Beta Systems will showcase our risk-driven Identity and Access Management suite at the conference which will be held in Munich on May 5-8 ,2015. We will present its new Fast Forward IAM solution, a fixed-price IAM offering for new customers that focuses on rapid implementation and cost-effectiveness. Furthermore we will reveal our new Garancy Recertification Center, a portal solution to review access rights and recertify or revoke entitlements.

Tags: | |

How to identify and measure IT access risks

Comments Off on How to identify and measure IT access risks

IT Risk Identification with Access Intelligence – Why you can’t do without it

Before access risks can be avoided, reduced or managed, they must first be identified. While this may seem trivial, it is a complex task in terms of permission management. Detecting and assessing risks among the enormous amounts of data that continuously accrue in the access management environment is a lot like finding the proverbial needle in the haystack. With a growing number of users, roles and IT systems – all of which must be granted permissions – the sheer number of risk opportunities rises exponentially.

A company with 5,000 employees and only 50 IT systems with ten permission groups each, for example, has over 2.5 million permission-granting possibilities, each of which may represent a high or low risk for the company. In light of this, the task of identifying all the existing risks from these permissions, assessing their effects and defining appropriate measures seems hopeless.

Tags: |