Category Archives: Compliance

Check out our new Garancy Recertification Center

Increase Security with Portal-Based Recertification of Access Rights

We are very pleased to announce the general availability of its Garancy Recertification Center, our portal solution to boost the use of SAM Enterprise for the efficient recertification of user access rights. It enables companies to review internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. The benefit to companies is an increase in the security and accuracy of recertifications, while making the recertification process itself auditable and compliant.

Recertification Task Force

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

IT Governance as Business Enabler

Access Governance is a must have

Access Governance

Access Governance

Organizations have an ongoing-need to support the companies to reach their strategic objetives. They must enable every employee or involved partner or contractor to perform better. At the same time organizations must manage the involved security risk when using the data and applications . Companies there

fore need to perform role and user management based on audit-compliant processes in order to meet compliance requirements. They require the highest possible level of transparency in order to implement and enforce consistent identity access governance processes.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

IAM data historization – a compliance necessity

With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Permission Path Analysis based on Access Intelligence

Many organisations have a heterogeneous system landscape which uses a number of different access right concepts. The goal of all these concepts is to provide users with those access rights on resources they need to fulfil their work. Based on the high number of users and resources to protect in large organisations, the administration of these access rights can be quite complex and time consuming. Here access intelligence comes into the play.

Tags: | |
Detlef Sturm
Senior System Architect Detlef Sturm is a Senior System Architect at Beta Systems Software AG with 20+ years’ experience in design and practice of system and software architectures. In addition to the technological aspects, he was significantly involved in drafting the strategic positioning of Access Governance in the IAM area. As Part of this strategy he took over the responsibility for design, architecture and development of the Access Intelligence product. He has built up extensive knowledge in BI technologies in particular based on the SQL server. In addition to the focus of the multidimensional design of data warehouse systems, it also deals with applications of analytics for IAM. These include the analysis of permission structures regarding relationships, history and risk. Even his physical fitness is given enough attention by regular jogging and biking. His best time in the marathon is currently 3:34 hours.