SOLUTIONS
SERVICES
CUSTOMERS
NEWS
COMPANY
Your needs
Standards and regulations
Different environments
Reviewing digital identities
Segregation of Duties (SoD)
Audits
Role building
Accounts review
IAM
Risk management
Kleverware IAG
Homogenisation
Mapping existing data
Compliance
History
Comparison
Reporting
Ongoing monitoring
Role Mining
K-Recertification Manager

Audits

You want to implement an IAM solution, but you still need to comply with regulations (SOX, LSF, Basel 3, Solvency 2), you need an ISO 27002 (or 27001/17799)/COBIT/CMMI/EBIOS/MEHARI/OCTAVE-certified quality management system or you have noticed that the security of your IS has been compromised because:

  • permissions have been granted as applications have been integrated and the IS has grown ('IS spaghetti');
  • out-of-date accounts are still active;
  • permissions (either with or without remote access) have been granted excessively;
  • access permissions are systematically extended;
  • it is difficult to ascertain who has access to generic accounts;
  • permissions are granted on an emergency basis without taking into account the requisite security measures due to the company expanding or mergers/acquisitions meaning that matters are generally being dealt with as quickly as possible;
  • systems or administrator accounts have been allocated on an unlimited basis;
  • etc.

In-depth knowledge of access permissions is key to successfully managing an information system:


Who is allowed to do What, How and Why ?

Formation © Kleverware

The answer with Kleverware IAG :


► Mapping existing data
► Compliance
► Reporting
► Ongoing monitoring

Top of page
Copyright Kleverware 2005 - 2017 - All rights reserved.