Role Based Access
With Role based access we start the journey into layering more control over the flat security architecture of generic AD networks. This is often required for employees with higher levels of infrastructure or data access. These range from IT Administrators who have access to large amounts of data via their elevated security rights, to users who have access to sensitive data as part of their daily role. The objective in these circumstances are to:
- only allow the person the minimum level of access required to complete their role, often known as least privilege
- clearly identify which staff member has accessed the information, no shared user id’s and password
- maintain an audit trail of access
Our solutions are
Okta |
Managing and controlling access to Cloud based application is a big headache for security teams as they often don't control the relationship between the business unit using the cloud service and the cloud service provider. By using Okta as your Identity provider, and by default providing a common access point for all your cloud applications, you can allocate access to cloud based applications depending on the role of the end user
|
Centrify Server Suite |
Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
|
AppGate |
Uses intelligent, contextual access control to leverage directory information and real-time variables to provide higher security through greater flexibility and responsiveness
Provides fortified, end-to-end defense against internal and external threats through a real-time, centrally managed access gateway and encrypted service-specific tunnels |