Identity Methods is first IAM solution partner in the UK

Identity Methods is the first IAM solution partner of Beta Systems in the UK

Identity MethodsWe are very pleased to announce our new partnership with Identity Methods. It is the first identity and access management solution partner in the United Kingdom. Our solution partners specialize in the sale and implementation of complex identity and access management solutions that require a high level of consulting.

Identity Methods is a leading provider of identity management solutions in the UK. Based in Brighton, they deliver complete identity and access management solutions using best of breed products from leading vendors. Identity Methods has expertise in Directories, Identity Management, Administration and Governance, Access, Authorization and Authentication software.

Identity and Access Management at DEVK Insurance Group

DEVK Identity and Access Management

Access Rights and Role Assignment with SAM Enterprise Identity Manager

Simple User Administration – Even without the IT Department

DEVK Insurance Group: Identity and Access Management

More effective and efficient IAM

Giving specialist departments the ability to self-administrate certain access rights greatly reduces the workload of IT staff. The DEVK insurance group implemented this strategy for optimized access management with the help of SAM Enterprise Identity Manager from Beta Systems. For DEVK this means much simpler and faster access rights allocation across all corporate IT systems. Even employees with little or no technical skills can assume basic user administration tasks.

DEVK has been insuring German policy holders against the risks of everyday life for over 125 years. At present, the DEVK Group is tending to approximately 4 million customers, insuring them against 14 million risks across all segments.

The upcoming update to the latest SAM Enterprise Version 2.1 underscores the insurer’s goal of further intensifying ‘specialist department self-governance’: The group is planning to introduce SAM Business Process Workflow, which will enable simple, browser-based individual request processes on the department level.

What you need to know about IAM System Migration

Successful IAM System Migration

“If you have to decide for a new house – Would it look exactly like your current home?”

Replacement of IAM legacy systemsThe question of system migration is a boon companion for IAM customers. Over the years, some established solutions like BMC’s Control-SA and SUN’s Identity Manager had to leave the market for various reasons. For existing customers of such systems, the replacement of their current installation is becoming a compelling need for the near future. With regards to this enterprise, several vendors are advertising and promising a smooth migration from the existing legacy solution to their platforms.

They argue, that certain tools will help to automatically convert and migrate existing data configurations to the new environment. But to tell the truth, an IAM system migration is a comparable effort like moving a home. To stay in this picture: Would it be really a big advantage for you, if the mover could place your furniture in the new home without instructions, because the old ground plot could be used for the new destination?

Insider threats – how to fight the vulnerabilities coming from within the company

Insider threats – how to fight the vulnerabilities coming from within the company

Insider Threats

Insider Threats

Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strenghten the protection of data.

Using the need “need to know” principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This webcast session will focus on how to adjust data access rights, implementing the “least privilege principal”, and the use of detective and proactive risk-oriented controls.

Join our 45 min webcast on insider threats on July 28, 2015 at and register here:
Webcast Insider Threats