Aveksa, Inc., a provider of Business-Driven Identity and Access Management solutions, today announced that enterprises can now take a business-driven approach to Identity and Access Management for data and applications both inside the firewall as well as in cloud environments. Unlike competing approaches, Aveksa?s solution unifies the management of identities and access across internal and external environments, without compromising visibility and control.
Organizations today are increasingly becoming hybrid, with critical applications and data frequently housed outside of the enterprise, and therefore not under direct control of IT or Information Security. While numerous technical tools exist that can help IT operations integrate and manage these cloud-based systems, Information Security teams have been struggling with how to bring these systems into their Identity and Access Management (IAM) programs. With the new Aveksa capabilities, organizations can now take a business-driven approach to IAM across the hybrid enterprise, and deploy business processes for lifecycle management and governance that extend from inside the firewall out to applications in the cloud.
The Aveksa platform?s new capabilities, leveraging Aveksa?s unique Security Integration Fabric?, enable both collection and change fulfillment for accounts, groups, profiles, roles and granular entitlements for cloud applications such as Salesforce, Google Apps, ServiceNow and NetSuite, and IaaS providers such as Amazon Web Services. The platform?s ability to deliver automated lifecycle management for joiners, movers and leavers, and policy-based access compliance, now extends to a host of popular cloud applications and services. While Aveksa?s new capabilities also include support for the emerging SCIM standard, they go far beyond SCIM in integrating with currently deployed cloud applications at the granular entitlement level.
With Aveksa?s new IAM capabilities, business managers can now review user entitlements, request access changes and define business roles or business policies, while IT can automate business processes that respond to identity and access lifecycle events and manage access risk across all key cloud and on-premise applications. By doing so, the Aveksa platform serves as a system of record for who has access to what and how they got it, and becomes a critical asset for business efficiency and continuous compliance.
Aveksa?s business-driven approach to IAM enables the line of business to take ownership and become accountable for user access to applications and data that they are responsible for. The Aveksa platform, using its ControlXSTM architecture, does this by:
? Shifting Access Decision Responsibility to the Business?Aveksa?s solutions enable the line of business to easily make access decisions, while remaining governed by Information Security-defined constraints.
? Providing a Centralized and Integrated Identity and Access Context at a Fine-Grained Level?Aveksa?s solutions ensure that enterprises can view and control access at the level of fine-grained entitlements, compared to the account level that competing solutions provide.
? Enabling a Process-Driven Approach?Efficiently and consistently manage identity and access business processes across the entire infrastructure and the entire identity lifecycle.
? Leveraging Policy-Based Automation and Compliance?Automated enforcement of governance policies ensures continuous compliance, independent of the infrastructure.
Source: http://www.globalsecuritymag.com/Aveska-extends-business-driven,20120820,31863.html
correspondents dinner i am legend san antonio spurs greta van susteren tony parker the five year engagement chris kreider
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.