Orchestrates Access Governance With Business Responsiveness
Transcript of Orchestrates Access Governance With Business Responsiveness
Manage and Automate
Employee iden�ty lifecycle
User self-service for access excep�ons
Excep�ons provisioning
Access cer�fica�ons
Self-service Password Management.
IGA reduces risks and improves compliance and audit performance of organiza�ons by automa�ng theiriden�ty and access crea�on, management and governance processes. IGA delivers an end-to-end pla�orm for allaccess requests, including excep�ons and provides close-loop remedia�on for access provisioning and deprovisioningof services. IGA user experience provides insights into the end user compute environment and helps organiza�onscorrelate endpoint performance and access.
IGA is very easy to deploy and maintain, thus ensuring excellent serviceability and integra�on within customerenvironments. The pre-packaged applica�on components make is easy for applica�on integra�on and coexistencewithin customers’ physical, virtual or cloud environments.
Automating Access Governance & Administration
Today’s complex IT environments create challenges around iden�ty governance,management and enforcement of access controls within the organiza�ons. Access policy viola�ons can expose organiza�ons to various challenges including audit noncompliance, fraud risks, data leakage/the�, managing stale/expired access across organiza�ons.
Automated enforcement of access policies, providing self-service access for ease of use, and managing access lifecycle for every employee are impera�ves towards crea�ng robust iden�ty governance and access administra�on solu�ons for organiza�ons.
Sequretek’s Iden�ty Governance & Administra�on (IGA) is an Iden�ty and access compliance solu�on that enables organiza�ons to achieve high automa�on levels while remaining compliant.
Employee Lifecycle, Access,User Experience & Compliance System
Page 1 of 4
Orchestrates Access Governance With Business Responsiveness
Identity Governance & Administration
(IGA)
+91 22 4022 7034 (INDIA)+1 201 940 3776/7 (USA)
India. USA. Canada© 2018-19. All rights reserved.
www.sequretek.com
Page 2 of 4
Organizations can derivethe following value from using IGA:
Orchestrate identities across various sources for unified access approvals
Effective real-time access compliance reports and dashboards that help increaseaudit performance
Automated provisioning and deprovisioning of various services through employeeself-service and approval workflows
Significantly reduce the risk associated with stale access/identities.
IGA Key Features
GRANULAR, COMPREHENSIVE DASHBOARDS & REPORTS SELF-SERVICE ACCESS REQUEST & USER EXPERIENCE
Gain a granular view of users, en�tlements,excep�ons, service access and endpoint deviceusage across the organiza�on
AUTOMATE ACCESS PROVISIONING AND DE-PROVISIONING
Pre-packaged/out-of-box strong workflows and application integration to ensure access grants as per yourpolicies
Ensure policy compliance by automa�cally disabling access upon expiry
Highly customizable workflow engine to add more services and applications.
Empower users to manage access withoutcontacting helpdesk
Intuitive workflows to guide users through accessand approvals
Centralized access policy controls
Self-service password management that eliminatescalls to help desk.
Actionable analytics to ensure implementation ofaccess compliance policies across the organization
User customizable reporting engine for specificaudit and compliance needs of your organization.
+91 22 4022 7034 (INDIA)+1 201 940 3776/7 (USA)
India. USA. Canada© 2018-19. All rights reserved.
www.sequretek.com
Page 3 of 4
Admin rights HR Management Systems Organiza�onal Access Inventory
Role-based compliance
Temporary access management
Revoke access at expiry
Excep�on Management
Access compliance for transfers
Contractor access compliance
Mul�-level approval audit trail
Ac�ve Directory harves�ng
So�ware license compliance
Contractor Management Systems
Email (Exchange, Lotus Notes)
Ac�ve Directory
Endpoint Protec�on System
Firewall, Web Proxy
ITSM (Inventory, License Mgmt.)
So�ware on Demand
Mobile Device Management
Firewall/IPS systems
Applica�ons using AD forauthen�ca�on
USB access
Internet access
File copy/transfer request
Folder crea�on/access
BYOD provisioning
Network printer configura�on
Distribu�on list management
Network access/ Wi-Fi access
So�ware on demand
Applica�on access
Password reset request
Some Examples Of Self-service Access Requests, Compliance andApplication Integration Include (But Not Limited to):
Self-service Access Application Integration Compliance
Sequretek IGA Helps Customers
Reduce risk of stale andinappropriate access
Enhance User ExperienceIncrease Employee Produc�vity
ImproveCompliance
+91 22 4022 7034 (INDIA)+1 201 940 3776/7 (USA)
India. USA. Canada© 2018-19. All rights reserved.
www.sequretek.com
Self-service AccessAutoma�on
Achieve Real-�me AccessCompliance
ComprehensiveApplica�on Integra�on
SELF-SERVICE
Integra�on with MS Ac�veDirectory, MS Exchange, IBM LotusNotes, Oracle Database and SQLDatabase, IBM IEM, SymantecAl�ris, MS SCCM, MS SCOMapplica�ons
Integra�on and/or data importfeature with most HRMS solu�ons
Integra�on with various securityand IT management tools forautomated provisioning andde-provisioning of services
Comprehensive connectorframework and web services forintegra�ng custom and cloudapplica�ons.
Improve audit performance throughautoma�on
Automated approval workflows for allservices and excep�ons
Access cer�fica�on and recer�fica�onas per regulatory needs
Dynamic approval levels – up to 4levels to capture complexity
Organiza�onal processes
Granular Out-of-box compliancedashboards and reports at all levels
Unified access approvals.
Complete control onprovisioning and de-provisioningof enterprise resources
Self-service portal for excep�onrequest management
Self-service passwordmanagement
Simplified iden�ty, accesscrea�on and managementduring employee on-boarding,transfer and exit
Comprehensive User experiencemanagement through easy todeploy workflows
Intui�ve user dashboards andrepor�ng.
ABOUT SEQURETEK
As the fastest growing, independent security, identity access governance and analytics provider, Sequretek helps global organizations to secure, protect and manage their information assets residing across different devices, data centers, and in the cloud.
Sequretek’s industry-leading product portfolio offers end-to-end security solutions ranging from modern endpoint protection to advanced access governance and analytics.
For more information, visit h�p://www.sequretek.com
Orchestrate Identities and Enforce Access Approvals
+91 22 4022 7034 (INDIA)+1 201 940 3776/7 (USA)
India. USA. Canada© 2018-19. All rights reserved.
www.sequretek.com