The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project based on Beta Systems’ IAM suite. The project is focusing on realizing a modern, workflow-structured and role-based IAM system that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.
Fast Forward and the new Garancy Recertification Center
Beta Systems will showcase our risk-driven Identity and Access Management suite at the conference which will be held in Munich on May 5-8 ,2015. We will present its new Fast Forward IAM solution, a fixed-price IAM offering for new customers that focuses on rapid implementation and cost-effectiveness. Furthermore we will reveal our new Garancy Recertification Center, a portal solution to review access rights and recertify or revoke entitlements.
Better protection against insider attacks
With the release of Garancy Access Intelligence Manager 2.1., we will offer a new add-on, the Garancy Time Traveler. The solution enables companies to analyze all changes to access rights for corporate data and applications at any time. As it continuously logs all changes to access rights, the Garancy Time Traveler allows users to check access rights for any point in time and within any timeframe.
This enables them to detect potential risks in good time and prevent them impacting the business. Using the Garancy Time Traveler helps companies to significantly reduce the risk of fraud and data theft by insiders. However, should a case of fraud or data breach occur, the tool includes extensively detailed forensic analyses with which users can pinpoint its source.
With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’