Author Archives: Dr. Axel Kern

About Dr. Axel Kern

Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.

How to get fit for an IAM implementation

Comments Off on How to get fit for an IAM implementation

What you need to do before you start an IAM implementation

Fit for an IAM implementation

How to get fit for an IAM implementation

There are several measures you can and should take to prepare for the successful, efficient and on-target IAM implementation. The more carefully such a project is planned, the smoother and simpler the actual implementation will turn out.

Many IAM projects end up exceeding the planned time and budget many times over. The possible reasons are manifold, but generally not only the system provider is to blame – instead, more likely than not, the project preparation and definition of the required specialist concepts was also flawed.

Tags: |

Observations on the Role Life-Cycle

Comments Off on Observations on the Role Life-Cycle

Dynamic organisations need to consider role life-cycle models

Role-Life-Cycle

Role-Life-Cycle

The main goals that companies want to achieve in security administration are enhanced security at a low cost, while coping with the challenges of an increasingly complex IT environment. A high level of security is important to prevent possible losses through fraud and unauthorised disclosure of confidential information. Internal audits often encounter severe security weaknesses which oblige the IT security department to take appropriate countermeasures.

An increasingly dynamic economy is an additional challenge within this context. The most important issues here are the rapid growth of companies, large-scale mergers, the ubiquity of the internet and continuous organisational change.

As most companies intensify their business of the internet, they are dealing with very large numbers of users.

Tags:

Measurable IAM Benefits – Part 3: IAM Cost Calculation

Comments Off on Measurable IAM Benefits – Part 3: IAM Cost Calculation

The costs of Identity and Access Management

IAM Portfolio

Beta Systems’ IAM Offering

After looking at the most important benefits of Identity and Access Management and the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise I will now look in part (3) of my little blog series on “Measurable IAM benefits – an infrastructure task” at the costs of identity and access management in more detail e.g. software licenses, maintenance, implementation and operating costs. How do you do an IAM cost calculation?

Tags: |

Measurable IAM benefits – an infrastructure task – Part (2)

Comments Off on Measurable IAM benefits – an infrastructure task – Part (2)

Increased Security Levels

identity and access management

identity and access management

After looking at the most important benefits of Identity and Access Management in my last post  I will continue with another post where I will especially be considering the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise. 

Tags: |