Identity & Access Management

Companies, organisations and public authorities not only need to manage the access rights of their own employees and managers, but also assign appropriate access rights to customers and business partners. Only in this way can it be ensured that everyone really only has access to the information for which authorisation is available. Identity & Access Management is about checking user data and then determining which network data the associated user is authorized to access.

Central management of users and access rights

Automated and rule based IAM (Identity Access Management) solutions ensure that authorized persons only have access to the data intended for their eyes. An identity access management tool can not only grant users access authorization to different sys-tems, cloud areas and applications, but also revoke this authorization, e.g. when em-ployees resign or a business partnership ends. As a rule, an email address or username and password are sufficient for identification. Particularly in the case of very sensitive information and access with strict security requirements, further identification factors such as biometric data, keycards or additional passwords can be added, which are sent using special security apps or via SMS.

Contact

Identity & Access Management

Header SITS DE

keyon true-Xtender

The Enterprise PKI, together with the keyon true-Xtender extensions from Swiss IT Security...
Read more
  Header SITS CH

Privileged access management

Would you like to secure, provision and manage privileged identities? Would you like to have...
Read more
Header SITS DE

OCSP Validation Server

OCSP is a protocol for checking the current validity status of an X.509 certificate online....
Read more

Jetzt herunterladen

Vielen Dank für Ihr Interesse!

Sie können das Infoblatt unter folgendem Link herunterladen.