Data includes intellectual property and information that can decide a company’s fate. Data and information, therefore, need to be optimally protected and secured to ensure that they cannot be compromised or lost.

Access Management
Access Managment
Data is a valuable asset for companies and should be protected.
Why do we need Access Management?
Different users and user groups (e.g. employees, third parties, customers, IT-systems) have access to sensitive and critical data on a hybrid IT-infrastructure (data centre, SaaS, Cloud Data Center) via different devices, from different locations and at different times. Users have left the traditional secure perimeters (e.g. the office building, factory premises) and are now able to access company data from anywhere in the world. Due to the complexity of this situation and in accordance with the Zero Trust security model, no user, device or partner system can be trusted until successful identification, authentication and authorisation has taken place.

Varying requirements for access management
Companies are required to provide secure login methods, either due to regulatory requirements (such as GDPR, MaRisk [Minimum Requirements for Risk Management], VAIT [Supervisory Requirements for IT in Insurance Undertakings], BAIT [Supervisory Requirements for IT in Financial Institutions]) or out of the company’s own interest to protect its digital assets. Simple authentications with username and password are no longer sufficient; transactions have to be specifically authorised (PSD 2), data traffic has to be analysed and regulated.
Establishing security is a technological challenge that sometimes contradicts user-friendliness. Nonetheless, users demand more user-friendly login procedures, the definition of which is not marked by security considerations. Thus, user acceptance is a considerable factor, which must be kept in mind. VPN is certainly still a necessary technology that has its applications - even today. However, the ongoing shift towards “access from anywhere” - especially to web applications operating in hybrid infrastructures - requires new approaches and technologies.
Standardisation is key
Standardisation reduces complexity
Standardisation reduces the potential for complexity, thus allowing the focus to remain on the essential aspects: Secure authentication via flexible and smart guidelines as well as an enhanced user-friendliness and thus user acceptance.
The technological foundation is, for example, supported by the OAuth and OpenIDConnect protocols. In cooperation with our partners, we can implement the appropriate technologies to meet your individual needs. Integration of applications, support of protocols by your applications, expansion of existing authentication procedures, etc. are tasks that we can tackle quickly and easily.
With our standardised approach and the appropriate products from our technology partners, we develop a customised solution for you.
How does access management fit with Identity Governance & Administration?
Access Management as an integral part of Identity Governance & Administration (IGA).
IGA is the solution-based mapping and execution of IT processes with the aim of facilitating, automating, controlling and comprehensively reporting user administration and access control of IT systems.. Primarily, two main areas of responsibility are distinguished:Identity Administration and Identity Governance.
Access Management complements the functions of Identity Governance & Administration with the aim of providing end-to-end security for IT resources and data. Necessary decisions regarding authentication and authorisation can be transferred to an IGA system and subjected to a holistic assessment and management.

Your benefit - our achievement
Your benefit
- Elimination and avoidance of weak passwords
- Improved security through multifactor authentication
- Reduction of costs for decentralised administration
- Improved integration and interoperability of applications in the security infrastructure
- Easy adaptation of security policies
- Cross-organisational authentication and federation
- Effective access to IT resources
Our achievement
- Analysis of the actual situation
- Development of a solution concept
- Integration of market-leading technology
- Adaptation of current trends and measures
- Implementation, support and operation
The right manufacturer for each project
