Top marks in the Fraunhofer IESE market analysis of BPM suites
identity access management workflows
The aim of the study is to provide an overview and comparison of the Business Process Management solutions available on the market to interested companies. The individual products were compared by their degree of fulfillment and comfort in different categories.
The study was carried out in the context of workshops in which the participants were to present their solution together with an implementation of a given process. The exciting part of the task was to apply previously unknown changes to the process and the organizational structure.
Read more →
Beta Systems solutions got Access Governance Award
The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project based on Beta Systems’ IAM suite. The project is focusing on realizing a modern, workflow-structured and role-based IAM system that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.
Read more →
New functions & features of SAM Enterprise 2.1 Value Pack 1
The new value pack SAM 2.1 VP1 supports now Linux Red Hat as installation platform.
Furthermore it also includes numerous enhancements for various connectors like IBM Security Access Manager former TAM Tivoli Access Manager, DB2, Lotus Domino, SAP and Windows Server, as well as the support of the new target system versions.
Besides general improvements the SAM Enterprise 2.1 Value Pack 1 now contains a new version of the workflow engine SAM Business Process Workflow.
The complete list of target system versions can be found in our Support Portal.
Business oriented IAM workflows: what they need to provide
Business Driver of identity access management workflows
Particularly in the field of authorization allocations, withdrawal of authorizations and authorization amendments, business-oriented approval workflows are rapidly gaining in significance.
This is largely due to the fact that the responsibility for ensuring that employees have the right access authorizations at the right time is being shouldered by the departments, not least as a result of legal regulations.
Read more →