Identity and Access Management (IAM)

block1

Why IAM?

Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons.

    • To fulfil the increased demand in security governance
    • To prevent employee access credentials / system hacking cases and data breach incidents¬†
    • To complement the changes in technology and way of life (IoT, BYOD, Mobility / remote workforce)
    • To enhance security for online file sharing and collaboration
    • To improve security such as a multi-factor authentication or biometric authentication
Need to implement IAM in your organization?

Components of IAM

    • Identity Management & Governance
    • Access Management (AM)
    • Directory Services (DS)
    • Privileged Account Management (PAM)
Need IAM?
block2
block3

Use Cases

    • Identity management

       

      User Access Life Cycle

      • Automated User management based on the HRMS Systems (Joiner Mover Leaver Process)
      • User Management through a Web portal
      • Role-based access control (provisioning and de-provisioning of access based on Designation, Department, Location of the user)
      • Self Service password management
      • Approval workflow-based Self Service portal for requesting application access

      Account Management

      • Generic Account Management
      • Service Account Management
      • Admin Account Management
      • Test Account Management

      Identity Governance

      • SOD Management
      • Periodic Access Reviews
      • Reporting

      Access Management

      • Single Sign-on

      Privileged Account Management (PAM)

      • Session Management
      • Password Vault
      • Threat Analytics
      • Privileged Access Governance
      • Two-Factor Authentication
Need IAM?