Can IAM software provide certificates for the compliance with legal regulations?
IAM Compliance Certificates
The introduction of IAM systems is often driven by the need for compliance with legal regulations. From high-level laws like the Sarbanes-Oxley Act (SOX) down to technical standards like ISO 27000 – the availability of an efficient Identity and Access Management is a prerequisite for the compliance with such frameworks. Therefore it is self-evident, that companies are asking vendors for the availability of general certificates that testify to be compliant with the individual regulation, when implementing the IAM solution.
To make a long story short:
Such certificates are either not available or of dubious validity.
Read more →
Identity Access Management, PAM, DAG
Between 2009 and 2014, the number of successful attacks on information security increased at an average annual rate of 66%. Bearing in mind that insiders are responsible for two thirds of these attacks, managing users’ access rights with Identity Access Management has become a critical issue taken very seriously by senior management.
A large number of security solutions are now available, offering different value propositions. Identity Access Management (IAM), data access governance (DAG) and privileged account management (PAM) solutions each make their contribution at different levels to controlling access rights. As the common denominator, the user’s identity can be used to de-compartmentalize these solutions, culminating in an integrated security concept. In the following I will describe a framework for using these products based on user identity, and outlines an integrated architecture meeting IT security requirements over the long term.
Read more →
Beta Systems will showcase their risk-driven Identity and Access Management suite at the Infosecurity Europe event which will be held in London on the 7th-9th June, 2016.
It is estimated that between 70-80% of all breaches of corporate information security are due to insiders. However, the right to data access of employees, contractors, partners and customers is one of the biggest vulnerabilities within IT security.
Read more →
Identity Manager Business Process Workflow
The new third value pack for SAM Enterprise Identity Manager 2.1 is now available. This version comes with many new features & functions that are related to our “Business Process” solution. The focus of these enhancements is on the process designer to make the implementation of individual processes smooth and easy. The further major focus is on the support of new target systems versions and new platform versions e.g. Windows Exchange Server 2016 or z/OS v2.2 as installation platforms. The RACF TSI has been enhanced by some new password processes based on the IBM Security Apar OA43999.
The complete list of target systems can be found on our support homepage.
For a detailed feature & functions list of the new value pack please contact your account manager.