Eva:
Let me come to another keyword: Secure Digital Identities. Once individual cards in sacred card index boxes and now ... the world has turned. But personal data is still a major asset that needs to be protected, and this applies to the data and access rights of employees, external persons and, of course, customers. In addition, there are authorizations that are stored in the system and need to be set up and managed securely there, right?
Eugenio:
Secure digital identities are of crucial importance for companies. Nothing has changed in this respect. However, the methods and possibilities have. The right system helps companies to ensure the security of digital identities. We support customers in selecting suitable identity management systems and identity access management systems, or IDM and IAM for short. Because one system is not the most suitable for everyone. We support customers during implementation and project management. Here, too, we develop tailor-made solutions for holistic customer identity and access management, in which the security of the individual identity-centric solutions environment plays a central role.
I would also be happy to describe our approach in concrete terms. After all, the challenges in identity management are many and varied. The questions are often whether and how it can be ensured that authorizations are immediately adjusted or withdrawn when employees' tasks change or they leave the organization, or how time-consuming it is to prove adherence to legal and regulatory compliance requirements. As part of identity management, we offer the planning and introduction of an automated identity management system that ensures the transfer of internal employees from the existing HR systems and regular reconciliation between IDM and HR. The central recording and management of external employee data is another building block. This is always accompanied by the definition of roles and associated authorizations, as well as role-based authorization management. Ultimately, we can enable a digital workflow for requesting and approving additional required authorizations and also create automated provisioning and deprovisioning of user accounts and authorizations in applications and systems.
As a matter of principle, we pursue a neutral consulting approach that is process-oriented and not vendor-driven. The first step is to analyze the legal, regulatory, contractual and operational requirements, which we use as a basis for recording, coordinating and consolidating the objectives of identity access management. We then look at the identification of identities, authoritative sources and systems, define the scopes with regard to identities and target systems as well as the processes to be covered. We analyze and weight the requirements and ultimately provide support in the selection of a suitable IAM system.
As part of the process, our services always include the development of security concepts and training programs to raise employee awareness of the risks of cyber threats.