We will showcase our risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016.
Access Governance Award for Beta Systems at the EIC 2014 and 2015
Our GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to access rights. The browser-based solution for the efficient recertification of access rights enables companies to review the internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. A Password Management module facilitates access to applications and simplifies the enforcement of IT security policies associated to passwords.
Read more →
IAM suite: Stop Insider Cyber Attacks
Companies are increasingly faced with the challenge of handling vast amounts of data generated by complex IT systems, as well as implementing and enforcing access control measures based on identity & access governance. Most companies deploy various dedicated applications and multiple platforms for each specialist department, and the users have widely differing access rights to these systems.
These organizations need identity & access management solutions that allow companies to make access rights assignment traceable and, moreover, automate all IT user management processes. It should minimize operational costs and ensure consistent adherence to internal and external IT security policies.
Read more →
Closing Pandora’s Box: Complex Application Security Requirements, Simplified Application Security Solutions
How to close the gap between password management, identity access management and application based policies to control all access
Once a user has been granted the permissions to access data and applications, how can we close the loopholes that may allow the user to access data in an inappropriate manner or ignore policy?
Using today’s ABAC (Attribute Based Access Control) standards, you can programmatically and systematically close the lid to Pandora’s box and ensure accesses are only occurring where and when they should by an authorized user.
Read more →
New Value Pack available for SAM Enterprise
The second value pack for SAM Enterprise Identity Manager is now available. The new version comes with a list of new features & functions like support of Solaris version 11 as TSI and the support of MS SQL Server 2014 as data base.
The complete list of target systems can be found on our support homepage.
Based on our customer requirements the SAM Business Process Workflow got many enhancements to improve the usability and the design of business processes.
For a detailed feature & functions list of the new value pack please contact your account manager.