Tag Archives: Identity and access management

Beta Systems at the European Identity and Cloud Conference in Munich 2016

We will showcase our risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016.

Access Governance Award for Beta Systems

Access Governance Award for Beta Systems at the EIC 2014 and 2015

Our GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to access rights. The browser-based solution for the efficient recertification of access rights enables companies to review the internal and external users’ access rights and to specify which managers are able to recertify or revoke user permissions. A Password Management module facilitates access to applications and simplifies the enforcement of IT security policies associated to passwords.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Controlling Corporate IT Identity Chaos and Access Risks

IAM suite: Stop Insider Cyber Attacks

IAM suite: Stop Insider Cyber Attacks

Companies are increasingly faced with the challenge of handling vast amounts of data generated by complex IT systems, as well as implementing and enforcing access control measures based on identity & access governance. Most companies deploy various dedicated applications and multiple platforms for each specialist department, and the users have widely differing access rights to these systems.

These organizations need identity & access management solutions that allow companies to make access rights assignment traceable and, moreover, automate all IT user management processes. It should minimize operational costs and ensure consistent adherence to internal and external IT security policies.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Join us in our webcast on Complex Application Security Requirements

 

Closing Pandora’s Box: Complex Application Security Requirements, Simplified Application Security Solutions

Join our webcast live online Nov 12, 2015

How to close the gap between password management, identity access management and application based policies to control all access

closing pandora's box

application security

Once a user has been granted the permissions to access data and applications, how can we close the loopholes that may allow the user to access data in an inappropriate manner or ignore policy?

Using today’s ABAC (Attribute Based Access Control) standards, you can programmatically and systematically close the lid to Pandora’s box and ensure accesses are only occurring where and when they should by an authorized user.

Tags: |
Ginny Turley
Ginny Turley is a seasoned Marketing professional with experience in product management, product marketing and brand management. She works hard to communicate and inform the market and thrives on delighting customers while exceeding expectations.

New Value Pack available for SAM Enterprise Identity Manager

New Value Pack available for SAM Enterprise

SAM Enterprise ValuePack2The second value pack for SAM Enterprise Identity Manager is now available. The new version comes with a list of new features & functions like support of Solaris version 11 as TSI and the support of MS SQL Server 2014 as data base.

The complete list of target systems can be found on our support homepage.

Based on our customer requirements the SAM Business Process Workflow got many enhancements to improve the usability and the design of business processes.

For a detailed feature & functions list of the new value pack please contact your account manager.

Tags: | | |
Stefanie Pfau
Product Manager IAM Stefanie has been working in the IT sector for 15 years and started as project manager for complex software projects for hospitals. From these very complex but more standardized healthcare projects, she moved to the retail industry with more international software projects meeting different international legal requirements and the fufilment of customer specific software solutions based on standard software. With her quick uptake, above average commitment, and analytical ability to see through complex situations, she took over responsibility for the technical product management at Beta Systems. With her proven track record and her excellent attention to detail and follow through she is a very strong asset for our IAM strategy development. Stefanie understands core business objectives, and translates them into excellent product solutions by creating detailed functional specifications for use by both technical and non-technical readers.