Somerford Associates
  • ABOUT US
  • SOLUTIONS
    • INFORMATION SECURITY
    • CLOUD SOLUTIONS
    • GDPR
    • INTERNET OF THINGS
    • BIG DATA
    • Financing
  • TECHNOLOGY
    • SPLUNK
    • OKTA
    • VARONIS
    • CENTRIFY
    • RESILIENT
    • IMPRIVATA
    • VASCO
    • CRYPTZONE
    • ENTERPRISEDB
  • GOVERNMENT
    • Government Specialists
    • G-Cloud
    • Government Events
    • GPG13
  • NEWS & EVENTS
    • NEWS
    • EVENTS
    • Webinar Library
    • Blog
  • SUPPORT
  • CONTACT US
    • Ask an expert

Role Based Access

With Role based access we start the journey into layering more control over the flat security architecture of generic AD networks. This is often required for employees with higher levels of infrastructure or data access. These range from IT Administrators who have access to large amounts of data via their elevated security rights, to users who have access to sensitive data as part of their daily role. The objective in these circumstances are to:
  • only allow the person the minimum level of access required to complete their role, often known as least privilege
  • clearly identify which staff member has accessed the information, no shared user id’s and password
  • maintain an audit trail of access


Our solutions are

Okta

Managing and controlling access to Cloud based application is a big headache for security teams as they often don't control the relationship between the business unit using the cloud service and the cloud service provider. By using Okta as your Identity provider, and by default providing a common access point for all your cloud applications, you can allocate access to cloud based applications depending on the role of the end user

Centrify Server Suite

Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.

AppGate

Uses intelligent, contextual access control to leverage directory information and real-time variables to provide higher security through greater flexibility and responsiveness

Provides fortified, end-to-end defense against internal and external threats through a real-time, centrally managed access gateway and encrypted service-specific tunnels
Contact Us
Privacy Policy
Complaints
Website by Mercia Digital/Alpha Quad
Icons designed by Vectors Market & DinosoftLabs from Flaticon
  • ABOUT US
  • SOLUTIONS
    • INFORMATION SECURITY
    • CLOUD SOLUTIONS
    • GDPR
    • INTERNET OF THINGS
    • BIG DATA
    • Financing
  • TECHNOLOGY
    • SPLUNK
    • OKTA
    • VARONIS
    • CENTRIFY
    • RESILIENT
    • IMPRIVATA
    • VASCO
    • CRYPTZONE
    • ENTERPRISEDB
  • GOVERNMENT
    • Government Specialists
    • G-Cloud
    • Government Events
    • GPG13
  • NEWS & EVENTS
    • NEWS
    • EVENTS
    • Webinar Library
    • Blog
  • SUPPORT
  • CONTACT US
    • Ask an expert
✕