cybersecurity_10_1920x540

IDENTITY & ACCESS MANAGEMENT

We work closely with you to develop and monitor holistic, automated user and authorisation management that covers all access rights and identities that corresponds to company and compliance requirements.
cybersecurity_7_1900x1900

IDENTITY LIFECYCLE MANAGEMENT

Take advantage of proven methods and processes to manage the lifecycle of the digital identities at your company. Our understanding of digital identities is not limited to you employees. We consider your partners, customers and IoT devices, too. We use our tried and tested procedure model to help you develop detailed HR management processes, providing information about how employees come into play, about existing processes and technical solution components already in place. Based on the evaluation of the model, we will recommend the most appropriate solution and support you in implementing the agreed goals. Our support includes both the organisational and the technological implementation.

  • Identity Management Processes – Initial Analysis (1-day workshop)
  • Tool Workshop: Microsoft Identity Manager 2016 – Initial Analysis (1-day Workshop)
  • Active Directory Redesign/Consolidation (1-day workshop)
  • Identity Management Technology (consulting on Microsoft Azure AD, Active Directory, LDAP, MIM)
  • Protect and manage digital, non-personal identities (IoT consulting)

media alt text

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment

cybersecurity_7_1900x1900

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment

FIVE FAMILIAR CHALLENGES...

  • employees complain that they must log in several times a day using different user IDs.
  • getting a new employee to the status of "ready for work" involves a high level of administrative effort and it may take several weeks until the user profile is configured with access authorisations.
  • We are increasingly using different (cloud) applications. How can updates or new applications be provided to users smoothly and with low effort?
  • only administrators are permitted to manage authorisations. This is carried out manually.
  • our IT services must be available to both our employees and external users, partners and customers.

Do you need support?

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment