Tag Archives: Compliance

What you need to know about GDPR and Identity Access Management

GDPR – General Data Protection Regulation

GDPR and Identity Access Management

Get ready for GDPR!

The General Data Protection Regulation (GDPR) is due to come into force in on 25th May, 2018 – so how will this affect your organization? How do you mitigate vulnerabilities and risks with the support of Identity Access Management?

You may feel overwhelmed by the requirements of this regulation, especially considering the financial ramifications of non-compliance. However, leveraging identity governance at the core of your security strategy can go a long way towards mitigating the risk of a data breach and the resulting penalties that may incur.

Tags: |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

What you need to know about IAM compliance certificates

Can IAM software provide certificates for the compliance  with legal regulations?

IAM Compliance Certificates

IAM Compliance Certificates

The introduction of IAM systems is often driven by the need for compliance with legal regulations. From high-level laws like the Sarbanes-Oxley Act (SOX) down to technical standards like ISO 27000 – the availability of an efficient Identity and Access Management is a prerequisite for the compliance with such frameworks. Therefore it is self-evident, that companies are asking vendors for the availability of general certificates that testify to be compliant with the individual regulation, when implementing the IAM solution.

To make a long story short:
Such certificates are either not available or of dubious validity.

Tags:
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Check out our new Garancy Recertification Center

Increase Security with Portal-Based Recertification of Access Rights

We are very pleased to announce the general availability of its Garancy Recertification Center, our portal solution to boost the use of SAM Enterprise for the efficient recertification of user access rights. It enables companies to review internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. The benefit to companies is an increase in the security and accuracy of recertifications, while making the recertification process itself auditable and compliant.

Recertification Task Force

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Insider threats – how to fight the vulnerabilities coming from within the company

Insider threats – how to fight the vulnerabilities coming from within the company

Insider Threats

Insider Threats

Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strenghten the protection of data.

Using the need “need to know” principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This webcast session will focus on how to adjust data access rights, implementing the “least privilege principal”, and the use of detective and proactive risk-oriented controls.

Join our 45 min webcast on insider threats on July 28, 2015 at and register here:
Webcast Insider Threats 

Tags: | |
Ginny Turley
Ginny Turley is a seasoned Marketing professional with experience in product management, product marketing and brand management. She works hard to communicate and inform the market and thrives on delighting customers while exceeding expectations.