Tag Archives: Compliance

Insider threats – how to fight the vulnerabilities coming from within the company

Insider threats – how to fight the vulnerabilities coming from within the company

Insider Threats

Insider Threats

Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strenghten the protection of data.

Using the need “need to know” principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This webcast session will focus on how to adjust data access rights, implementing the “least privilege principal”, and the use of detective and proactive risk-oriented controls.

Join our 45 min webcast on insider threats on July 28, 2015 at and register here:
Webcast Insider Threats 

Tags: | |
Ginny Turley
Ginny Turley is a seasoned Marketing professional with experience in product management, product marketing and brand management. She works hard to communicate and inform the market and thrives on delighting customers while exceeding expectations.

IT Governance as Business Enabler

Access Governance is a must have

Access Governance

Access Governance

Organizations have an ongoing-need to support the companies to reach their strategic objetives. They must enable every employee or involved partner or contractor to perform better. At the same time organizations must manage the involved security risk when using the data and applications . Companies there

fore need to perform role and user management based on audit-compliant processes in order to meet compliance requirements. They require the highest possible level of transparency in order to implement and enforce consistent identity access governance processes.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Meet Beta Systems at the European Identity and Cloud Conference 2015

Fast Forward and the new Garancy Recertification Center

Garancy Portal

Garancy Portal

Beta Systems will showcase our risk-driven Identity and Access Management suite at the conference which will be held in Munich on May 5-8 ,2015. We will present its new Fast Forward IAM solution, a fixed-price IAM offering for new customers that focuses on rapid implementation and cost-effectiveness. Furthermore we will reveal our new Garancy Recertification Center, a portal solution to review access rights and recertify or revoke entitlements.

Tags: | |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

IAM data historization – a compliance necessity

With the growing spread and availability of IAM systems, auditors are getting more and more demanding concerning their expectations for powerful analytic capabilities regarding the IAM data historization. Over the last decade, most IAM systems were implemented because of the dreaded question ‘Who is allowed to do what in your organization?’

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.