Category Archives: Provisioning

IAM for Insurance Provider

Insurer gain secure access to all applications – IAM for insurance provider

IAM for insurance provider

IAM for insurance provider

Insurance providers are often businesses with complex, distributed structures are faced with the challenge of managing complex and heterogeneous IT landscapes centrally and effectively, all the while being under extreme pressure to save time and costs. Mergers and acquisitions have further added to this challenge  in recent years. All the thousands of employees require access to a broad range of different software systems depending on their tasks.

Tags: | |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Observations on the Role Life-Cycle

Dynamic organisations need to consider role life-cycle models

Role-Life-Cycle

Role-Life-Cycle

The main goals that companies want to achieve in security administration are enhanced security at a low cost, while coping with the challenges of an increasingly complex IT environment. A high level of security is important to prevent possible losses through fraud and unauthorised disclosure of confidential information. Internal audits often encounter severe security weaknesses which oblige the IT security department to take appropriate countermeasures.

An increasingly dynamic economy is an additional challenge within this context. The most important issues here are the rapid growth of companies, large-scale mergers, the ubiquity of the internet and continuous organisational change.

As most companies intensify their business of the internet, they are dealing with very large numbers of users.

Tags:
Dr. Axel Kern
Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.

Measurable IAM benefits – an infrastructure task – Part (2)

Increased Security Levels

identity and access management

identity and access management

After looking at the most important benefits of Identity and Access Management in my last post  I will continue with another post where I will especially be considering the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise. 

Tags: |
Dr. Axel Kern
Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.

Measurable IAM benefits – an infrastructure task – Part (I)

An investment decision for an Identity Management solution is not based on a “need-to-have” perception, but is increasingly oriented towards measurable IAM benefits: an increase in security levels and in the efficiency of identity administration.

The term “Identity and Access Management” (IAM) includes all aspects of the administration of digital identities. This is initially an infrastructure task which is indispensable to the proper functioning of an organization. It is also a management task, since these activities affect data security and the efficiency of business processes.

Tags: |
Dr. Axel Kern
Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.