Tag Archives: Identity Management

Beta Systems expands its IAM Partner Business with 6 new Partners

Comments Off on Beta Systems expands its IAM Partner Business with 6 new Partners

Beta Systems’ partner program which has been introduced a year ago– and its drive to increase its reach in Europe with more partners for its identity and access management (IAM) solutions – is a major part of Beta Systems ongoing growth strategy.

IAM Partner BusinessThe Identity Access Management Suite of Beta Systems has been selected by another six channel partners to deliver advanced IAM and Governance solutions to large and medium enterprises in Europe. Headquartered in Central Europe, United Kingdom and the Adriatic region, the firms are recognized leaders in their markets.

These new partnerships further strengthen the IAM Channel Business in Europe. They underline the continuing success of Beta Systems’ partner program. Over the last 12 months, Beta Systems has succeeded in attracting more than 15 top-flight partners in different key European markets for its range of IAM solutions.

Tags: | |

IAM workflow with highest marks on fulfillment and comfort

Comments Off on IAM workflow with highest marks on fulfillment and comfort

Top marks in the Fraunhofer IESE market analysis of BPM suites

IAM Workflow Business Driver

identity access management workflows

The aim of the study is to provide an overview and comparison of the Business Process Management solutions available on the market to interested companies. The individual products were compared by their degree of fulfillment and comfort in different categories.

The study was carried out in the context of workshops in which the participants were to present their solution together with an implementation of a given process. The exciting part of the task was to apply previously unknown changes to the process and the organizational structure.

Tags: |

Permission Path Analysis based on Access Intelligence

Comments Off on Permission Path Analysis based on Access Intelligence

Many organisations have a heterogeneous system landscape which uses a number of different access right concepts. The goal of all these concepts is to provide users with those access rights on resources they need to fulfil their work. Based on the high number of users and resources to protect in large organisations, the administration of these access rights can be quite complex and time consuming. Here access intelligence comes into the play.

Tags: | |