IDENTITY AND ACCESS MANAGEMENT

As our technological ecosystem grows, our systems are no longer restricted to our physical premises. Our systems are accessed day and night from anywhere in the world.

Identity and Access Management allows you to securely manage the complete identity lifecycle of people and services across all kinds of devices.

THE SOLUTION

WHAT IS IdAM?

Identity and Access Management ensures that the people getting access to your network are who they say they are. An identity management system enables administrators to manage access privileges for identities throughout an organisation. A comprehensive solution enables full lifecycle management as employees leave or transition through environments. Identity and Access Management improves governance and compliance within organisations. Identity management systems require companies to have a defined and operational access management policy, reducing the risk of internal and external breaches.

60%

OF ALL DATA BREACHES ARE COMMITTED BY AN ORGANISATIONS EMPLOYEES.

75% OF THESE WERE MALICIOUS

25% WERE DUE TO POOR ACCESS MANAGEMENT

PRODUCTS

THE JELLYFISH IdAM SOLUTION

Our Identity and Access Management module within Jellyfish provides strong authentication to ensure the authenticity of those accessing your network. Jellyfish oversees users, credentials, devices and access through the collecting, managing and synchronising of data.

Collect

Our IdAM systems provide the basis to collect identity information and attributes.

Manage

Identity information is managed within the system and across modules. This allows you to provision and deprovision for common applications.

Synchronise

Information is sychronised across disparate systems in to an integrated system, offering a higher level of organisational visibility.

Benefits

LAYERS OF SECURITY WITH JUST ONE TOOL

Cogito Group’s Jellyfish is a complete and integrated cyber security platform, which:

  • Offers the cost benefits of a cloud service
  • Improves productivity of resources
  • Improves transparency through monitoring, auditing, reporting of security breaches
  • Highly scalable through a customised modular approach
  • Automated workflows
  • Reduced management efforts

Capabilities

COMPREHENSIVE AND AGILE

Jellyfish has the ability to support full IdAM capabilities and can also integrate with the following IdAM and SSO platforms:

Evolveum Midpoint

Oracle Identity Manager

SailPoint Identity IQ

LDAP Repositories (Including but not limited to: Microsoft Active Directory, ADAM and AD LDS)

Gluu

ForgeRock Identity Platform and Access Management Platform

AU: +61 2 6140 4494

NZ: +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

 

Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you