Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite

Beta Systems solutions got Access Governance Award

Beta Systems solutions got Access Governance Award

The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project based on Beta Systems’ IAM suite. The project is focusing on realizing a modern, workflow-structured and role-based IAM system that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.

New Value Pack of SAM Enterprise Identity Access Manager 2.1 available now

New functions & features of SAM Enterprise 2.1 Value Pack 1

Risk Driven IAMThe new value pack SAM 2.1 VP1 supports now Linux Red Hat as installation platform.

Furthermore it also includes numerous enhancements for various connectors like IBM Security Access Manager former TAM Tivoli Access Manager, DB2, Lotus Domino, SAP and Windows Server, as well as the support of the new target system versions.

Besides general improvements the SAM Enterprise 2.1 Value Pack 1 now contains a new version of the workflow engine SAM Business Process Workflow.

 The complete list of target system versions can be found in our Support Portal.

 

Meet Beta Systems at the European Identity and Cloud Conference 2015

Fast Forward and the new Garancy Recertification Center

Garancy Portal

Garancy Portal

Beta Systems will showcase our risk-driven Identity and Access Management suite at the conference which will be held in Munich on May 5-8 ,2015. We will present its new Fast Forward IAM solution, a fixed-price IAM offering for new customers that focuses on rapid implementation and cost-effectiveness. Furthermore we will reveal our new Garancy Recertification Center, a portal solution to review access rights and recertify or revoke entitlements.

How to identify and measure IT access risks

IT Risk Identification with Access Intelligence – Why you can’t do without it

Before access risks can be avoided, reduced or managed, they must first be identified. While this may seem trivial, it is a complex task in terms of permission management. Detecting and assessing risks among the enormous amounts of data that continuously accrue in the access management environment is a lot like finding the proverbial needle in the haystack. With a growing number of users, roles and IT systems – all of which must be granted permissions – the sheer number of risk opportunities rises exponentially.

A company with 5,000 employees and only 50 IT systems with ten permission groups each, for example, has over 2.5 million permission-granting possibilities, each of which may represent a high or low risk for the company. In light of this, the task of identifying all the existing risks from these permissions, assessing their effects and defining appropriate measures seems hopeless.