IAM data historization – a compliance necessity

With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’

Beta Systems Improves Position in New Gartner Magic Quadrant for Identity Governance and Administration

Take a look at our latest press release about our strong improvement of our position in the Gartner Magic Quadrant for Identity Governance and Administration:

Beta Systems Improves Position in New Gartner Magic Quadrant for Identity Governance and Administration

Berlin, Germany. 16. January 2015 – Beta Systems announced today that its position in the new Gartner Magic Quadrant for Identity Governance and Administration (IGA) has improved for “Ability to Execute” and “Completeness of Vision” compared to last year’s Magic Quadrant.

Permission Path Analysis based on Access Intelligence

Many organisations have a heterogeneous system landscape which uses a number of different access right concepts. The goal of all these concepts is to provide users with those access rights on resources they need to fulfil their work. Based on the high number of users and resources to protect in large organisations, the administration of these access rights can be quite complex and time consuming. Here access intelligence comes into the play.

Measurable IAM benefits – an infrastructure task – Part (I)

An investment decision for an Identity Management solution is not based on a “need-to-have” perception, but is increasingly oriented towards measurable IAM benefits: an increase in security levels and in the efficiency of identity administration.

The term “Identity and Access Management” (IAM) includes all aspects of the administration of digital identities. This is initially an infrastructure task which is indispensable to the proper functioning of an organization. It is also a management task, since these activities affect data security and the efficiency of business processes.