Beta Systems will showcase their risk-driven Identity and Access Management suite at the Infosecurity Europe event which will be held in London on the 7th-9th June, 2016.
It is estimated that between 70-80% of all breaches of corporate information security are due to insiders. However, the right to data access of employees, contractors, partners and customers is one of the biggest vulnerabilities within IT security.
Read more →
Identity Manager Business Process Workflow
The new third value pack for SAM Enterprise Identity Manager 2.1 is now available. This version comes with many new features & functions that are related to our “Business Process” solution. The focus of these enhancements is on the process designer to make the implementation of individual processes smooth and easy. The further major focus is on the support of new target systems versions and new platform versions e.g. Windows Exchange Server 2016 or z/OS v2.2 as installation platforms. The RACF TSI has been enhanced by some new password processes based on the IBM Security Apar OA43999.
The complete list of target systems can be found on our support homepage.
For a detailed feature & functions list of the new value pack please contact your account manager.
We will showcase our risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016.
Access Governance Award for Beta Systems at the EIC 2014 and 2015
Our GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to access rights. The browser-based solution for the efficient recertification of access rights enables companies to review the internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. A Password Management module facilitates access to applications and simplifies the enforcement of IT security policies associated to passwords.
Read more →
What you need to do before you start an IAM implementation
How to get fit for an IAM implementation
There are several measures you can and should take to prepare for the successful, efficient and on-target IAM implementation. The more carefully such a project is planned, the smoother and simpler the actual implementation will turn out.
Many IAM projects end up exceeding the planned time and budget many times over. The possible reasons are manifold, but generally not only the system provider is to blame – instead, more likely than not, the project preparation and definition of the required specialist concepts was also flawed.
Read more →