cybersecurity_10_1920x540

IDENTITY & ACCESS MANAGEMENT

We work closely with you to develop and monitor holistic, automated user and authorisation management that covers all access rights and identities that corresponds to company and compliance requirements.

IDENTITY LIFECYCLE MANAGEMENT

Take advantage of proven methods and processes to manage the lifecycle of the digital identities at your company. Our understanding of digital identities is not limited to you employees. We consider your partners, customers and IoT devices, too. We use our tried and tested procedure model to help you develop detailed HR management processes, providing information about how employees come into play, about existing processes and technical solution components already in place. Based on the evaluation of the model, we will recommend the most appropriate solution and support you in implementing the agreed goals. Our support includes both the organisational and the technological implementation.

  • Identity Management Processes – Initial Analysis (1-day workshop)
  • Tool Workshop: Microsoft Identity Manager 2016 – Initial Analysis (1-day Workshop)
  • Active Directory Redesign/Consolidation (1-day workshop)
  • Identity Management Technology (consulting on Microsoft Azure AD, Active Directory, LDAP, MIM)
  • Protect and manage digital, non-personal identities (IoT consulting)

IDENTITY LIFECYCLE MANAGEMENT

Take advantage of proven methods and processes to manage the lifecycle of the digital identities at your company. Our understanding of digital identities is not limited to you employees. We consider your partners, customers and IoT devices, too. We use our tried and tested procedure model to help you develop detailed HR management processes, providing information about how employees come into play, about existing processes and technical solution components already in place. Based on the evaluation of the model, we will recommend the most appropriate solution and support you in implementing the agreed goals. Our support includes both the organisational and the technological implementation.

  • Identity Management Processes – Initial Analysis (1-day workshop)
  • Tool Workshop: Microsoft Identity Manager 2016 – Initial Analysis (1-day Workshop)
  • Active Directory Redesign/Consolidation (1-day workshop)
  • Identity Management Technology (consulting on Microsoft Azure AD, Active Directory, LDAP, MIM)
  • Protect and manage digital, non-personal identities (IoT consulting)

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment

ACCESS MANAGEMENT: ROLES, AUTHORISATIONS & ACCESS

Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service. As a result of our procedures, authorised users and digital identities hold exclusive permissions to use defined rights and perform actions. Our consulting portfolio:

  • company-wide role and authorisation management
  • identity & access management processes for SAP & Non-SAP (consulting, design, implementation & operations)
  • single sign-on & multi-factor authentication/conditional access (Kerberos, SAML, ADF, Smartcards, and more)
  • privileged identity management with Microsoft tools
  • identity protection: detecting vulnerabilities in the identity environment