Author Archives: Stefanie Pfau

About Stefanie Pfau

Product Manager IAM Stefanie has been working in the IT sector for 15 years and started as project manager for complex software projects for hospitals. From these very complex but more standardized healthcare projects, she moved to the retail industry with more international software projects meeting different international legal requirements and the fufilment of customer specific software solutions based on standard software. With her quick uptake, above average commitment, and analytical ability to see through complex situations, she took over responsibility for the technical product management at Beta Systems. With her proven track record and her excellent attention to detail and follow through she is a very strong asset for our IAM strategy development. Stefanie understands core business objectives, and translates them into excellent product solutions by creating detailed functional specifications for use by both technical and non-technical readers.

New Value Pack of SAM Enterprise Identity Access Manager 2.1 available now

Posted by · filed under Identity Access Management
Comments Off on New Value Pack of SAM Enterprise Identity Access Manager 2.1 available now

New functions & features of SAM Enterprise 2.1 Value Pack 1

Risk Driven IAMThe new value pack SAM 2.1 VP1 supports now Linux Red Hat as installation platform.

Furthermore it also includes numerous enhancements for various connectors like IBM Security Access Manager former TAM Tivoli Access Manager, DB2, Lotus Domino, SAP and Windows Server, as well as the support of the new target system versions.

Besides general improvements the SAM Enterprise 2.1 Value Pack 1 now contains a new version of the workflow engine SAM Business Process Workflow.

 The complete list of target system versions can be found in our Support Portal.


Tags: |

How to identify and measure IT access risks

Comments Off on How to identify and measure IT access risks

IT Risk Identification with Access Intelligence – Why you can’t do without it

Before access risks can be avoided, reduced or managed, they must first be identified. While this may seem trivial, it is a complex task in terms of permission management. Detecting and assessing risks among the enormous amounts of data that continuously accrue in the access management environment is a lot like finding the proverbial needle in the haystack. With a growing number of users, roles and IT systems – all of which must be granted permissions – the sheer number of risk opportunities rises exponentially.

A company with 5,000 employees and only 50 IT systems with ten permission groups each, for example, has over 2.5 million permission-granting possibilities, each of which may represent a high or low risk for the company. In light of this, the task of identifying all the existing risks from these permissions, assessing their effects and defining appropriate measures seems hopeless.

Tags: |