In order to optimize our website for you and to continuously improve it, we use cookies. By continuing to use the website, you consent to the use of cookies. For more information on cookies, please refer to our Privacy Policy.
Cybersecurity_10_1920x540

IDENTITY & ACCESS MANAGEMENT

We work closely with you to develop and monitor holistic, automated user and authorisation management that covers all access rights and identities that corresponds to company and compliance requirements.

IDENTITY LIFECYCLE MANAGEMENT

Take advantage of proven methods and processes to manage the lifecycle of the digital identities at your company. Our understanding of digital identities is not limited to you employees. We consider your partners, customers and IoT devices, too. We use our tried and tested procedure model to help you develop detailed HR management processes, providing information about how employees come into play, about existing processes and technical solution components already in place. Based on the evaluation of the model, we will recommend the most appropriate solution and support you in implementing the agreed goals. Our support includes both the organisational and the technological implementation.

  • Identity Management Processes – Initial Analysis (1-day workshop)
  • Tool Workshop: Microsoft Identity Manager 2016 – Initial Analysis (1-day Workshop)
  • Active Directory Redesign/Consolidation (1-day workshop)
  • Identity Management Technology (consulting on Microsoft Azure AD, Active Directory, LDAP, MIM)
  • Protect and manage digital, non-personal identities (IoT consulting)

FIND OUT MORE FROM OUR EXPERTS

Transformation_18_1900x750

IAM IN A HETEROGENEOUS MULTI-CLOUD WORLD

WEB SESSION REPLAY

How can I prevent user and authorisation management from increasingly eating up resources in a hybrid IT world, whilst sustaining the rising number IT requests from employees?

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment

  • employees complain that they must log in several times a day using different user IDs.
  • getting a new employee to the status of "ready for work" involves a high level of administrative effort and it may take several weeks until the user profile is configured with access authorisations.
  • We are increasingly using different (cloud) applications. How can updates or new applications be provided to users smoothly and with low effort?
  • only administrators are permitted to manage authorisations. This is carried out manually.
  • our IT services must be available to both our employees and external users, partners and customers.

Do you need support?

IDENTITY GOVERNANCE

Identity governance is the policy-based, centralised management of identity and access management processes. As a result, identity governance supports your company in both its IT security and compliance requirements. We assist you in creating a corresponding model and developing a solution adapted to your company requirements. Segregation of duties (SoD) and rectification processes are thus no longer an issue, allowing authorisation and access to be traced at any time.

  • policy-based, centralised management of access management (consulting on re-certification, etc.)