Do you know who has access to your protected systems? Who authorises access for staff, partners and members of the public? Can you identify when access policy has been violated?
Let us help you implement a comprehensive attestation and reporting facility that will keep managers responsible for your company’s access governance.
Cloud Identity
Are your cloud identities securely provisioned? Can your staff use their cloud identities for federation? Do you have single sign-on between your on-premise and cloud applications?
Let us help you deploy best-practice identity-as-a-service infrastructure
Mobility
Do you have central policy administration covering all remote devices? Are you protocol compliant? Can you remotely manage company data on personal devices?
Let us assist in developing and deploying a coherent and planned remote device management environment.
Privacy
Do you have a published privacy policy? Can you satisfy requests from your staff, or public, for access to identity information? Are you compliant with the Australian Privacy Amendment Act commencing 12 March 2014?
Let us help you develop and implement a robust and cost-effective solution to ensuring identity information is kept private.
Identity and Access Management in Government ICA's is pleased to be working with KuppingerCole (Asia Pacific) and on the delivery of a webinar on identity managment in education.