Tag Archives: Identity Management

Out now: The new GARANCY Identity Access Management Suite

Beta Systems today unveiled its new Identity Access Management Suite and IAM website

New GARANCY IAM Suite

Beta Systems’ Identity Access Management Suite brings maximum flexibility to dynamic companies.

Today Beta Systems announced the new version of its Identity Access Management Suite. The product family, for the first time presented under the new GARANCY product label, offers many new functions and enhanced integration of the individual components.

For detailed information go to our new identity and access management website, which was also launched today.

Beta Systems IAM – Maximum Flexibility for Dynamic Companies

The updated and improved functions of the GARANCY IAM Suite specifically address the ongoing changes and emerging requirements that affect all corporate areas of the customer base. Altered or upscaled IT landscapes, new legal regulations and increasingly stringent audits as well as changed user and usage profiles pose challenges to modern companies in the wake of key trends such as digital transformation and Industry 4.0.

Tags: | |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Password Management New Release Available Now

Today we are happy to announce the release of the new version of its Password Management solution SAM Password 5.3. SAM Password is designed to simplify access across networks of distributed computers without compromising security. It consists of SAM Password Synchronization and SAM Password Self Reset, providing improvements that extent the feature set of this proven technology. With SAM Password, companies reduce the cost and security exposures related to the management of user passwords and user availability.

Password Management IAMSAM Password Synchronization provides a consistent method for managing the major aspects of password and user id access attributes across multiple platforms. Changing a password on one systems results

Tags: |
Stefanie Pfau
Product Manager IAM Stefanie has been working in the IT sector for 15 years and started as project manager for complex software projects for hospitals. From these very complex but more standardized healthcare projects, she moved to the retail industry with more international software projects meeting different international legal requirements and the fufilment of customer specific software solutions based on standard software. With her quick uptake, above average commitment, and analytical ability to see through complex situations, she took over responsibility for the technical product management at Beta Systems. With her proven track record and her excellent attention to detail and follow through she is a very strong asset for our IAM strategy development. Stefanie understands core business objectives, and translates them into excellent product solutions by creating detailed functional specifications for use by both technical and non-technical readers.

How to get fit for an IAM implementation

What you need to do before you start an IAM implementation

Fit for an IAM implementation

How to get fit for an IAM implementation

There are several measures you can and should take to prepare for the successful, efficient and on-target IAM implementation. The more carefully such a project is planned, the smoother and simpler the actual implementation will turn out.

Many IAM projects end up exceeding the planned time and budget many times over. The possible reasons are manifold, but generally not only the system provider is to blame – instead, more likely than not, the project preparation and definition of the required specialist concepts was also flawed.

Tags: |
Dr. Axel Kern
Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.

10 quick tips on Identity Access Management

Here are our Identity Access Management (IAM) top tips for the implementation of an solution to protect company informatiion from unauthorized access by internal and external users.

Quick tips Identity Access Management – what you need to consider

Identity Access Management - the key to enhanced security

Identity Access Management – the key to enhanced security

End-to-End Access Management

Organizations should be able to match every existing user account in Active Directory, Lotus Notes, SAP, or other business-critical applications to a real person currently working for the company. Aside from the security aspect, unused application licenses cost a lot of money.

Tags:
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.