Investigate and track access right changes with Garancy Time Traveler

Better protection against insider attacks

Garancy Time Traveler

Benefits of the Garancy Time Traveler

With the release of Garancy Access Intelligence Manager 2.1., we will offer a new add-on, the Garancy Time Traveler. The solution enables companies to analyze all changes to access rights for corporate data and applications at any time. As it continuously logs all changes to access rights, the Garancy Time Traveler allows users to check access rights for any point in time and within any timeframe.

This enables them to detect potential risks in good time and prevent them impacting the business. Using the Garancy Time Traveler helps companies to significantly reduce the risk of fraud and data theft by insiders. However, should a case of fraud or data breach occur, the tool includes extensively detailed forensic analyses with which users can pinpoint its source.

Mapping IAM to the Cloud: What you need to consider

Mapping IAM to the Cloud: IAM is growing beyond the premises / Cloud

Identity and Access Management in the Cloud

Identity and Access Management in the Cloud

Although the term ‘Global Village’ is already celebrating its 53rd birthday this year (according to Wikipedia, it was introduced by Marshall McLuhan in his books “The Gutenberg Galaxy: The Making of Typographic Man in 1962)” it has never been more prevailing: Looking to a typical company setup today, everything seems globally interwoven – teams, processes, IT-systems. As one of the consequences IAM systems are challenged to consider and cover this flexibility in its concepts.

The biggest attention in this structural change is probably given to the idea of Cloud Computing.

Measurable IAM Benefits – Part 3: IAM Cost Calculation

The costs of Identity and Access Management

IAM Portfolio

Beta Systems’ IAM Offering

After looking at the most important benefits of Identity and Access Management and the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise I will now look in part (3) of my little blog series on “Measurable IAM benefits – an infrastructure task” at the costs of identity and access management in more detail e.g. software licenses, maintenance, implementation and operating costs. How do you do an IAM cost calculation?

How to avoid IAM pitfalls

9 pitfalls to avoid when implementing an IAM solution

Chances are, your organization already has a plan and a collection of solutions for the complex issues surrounding Identity Access Management and Governance (IAM). But the real trick is figuring out how to avoid IAM pitfalls that have challenged even the most talented organizations in the implementation process. Here are the 9 major IAM pitfalls to avoid: