Effective identity administration and management

Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future.

Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. ACI will help you avoid these problems.

In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved.

Wouldn’t it be better to control identities automatically and centrally from one place?

ACI is the solution that will enable you to do this!

ACI - Identity Management System (IDM) by Cleverlance, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.

Consulting

We provide our customers with a complete professional IT consulting and implementation service.

Easy

Our IDM is easy to control and administer – ACI controls accounts in a complex way and from one location.

We offer a set of connectors for individual applications in your organization.

Efektivita

Nezatěžujeme finančně rozpočet vaší organizace licenčními poplatky jako drahá komerční řešení (Oracle, Novell, IBM, Microsoft atd.).

History

All operations and changes in identity management are recorded in detail and quickly plus clearly accessible in the history view.

References

AGROTEC

Implementation of the AC Identity management system, including integration with SAP, Active Directory, MS Exchange, SharePoint company portal, including implemented applications (e.g. contract module).AC Identity effectively controls the identity life cycle in Agrotec and its subsidiaries. Besides that, AC Identity primarily controls user permissions on the Intranet and SharePoint contract module.

JIHOČESKÝ KRAJ

Implementace identity management systému ACI pro správu interních identit krajského úřadu a externích identit zřizovaných organizací jejíž součástí bylo napojení na klíčové systémy úřadu jako: Personální systém, Spisová služba, Firemní adresář, E-mail, ale i platformu pro komunikaci se základními registry a integrační platformu. ACI centrálně a automatizovaně řídí oprávnění v 24 systémech kraje.

DPP

Cílem projektu byla centrální správa uživatelů Dopravního podniku hl. m. Prahy. Díky integraci na jednotlivé systémy IDM efektivně řídí životní cyklus identit ve více než 120 aplikacích, mezi které patří např. PMS, Active Directory, SharePoint, MS Exchange, Helpdesk, Elektronickou spisovou službou, CSU a mnoho dalších. V DPP tak mají přehled o oprávnění interních i externích uživatelů na jednom místě, které mohou automatizovaně a efektivně řídit.

BANKA CREDITAS

Navržené řešení odráželo požadavek Banky Creditas na řízení identit v propojených systémech. Nejdříve bylo nutné provést podrobnou analýzu jednotlivých aplikací, aby pak následná implementace IDM řešení, moduly notifikací a automatických pravidel umožňuli efektivně řídit celý životní cyklus identit ve společnosti.

Kontaktujte nás

Pokud Vás zajímá náš produkt a chcete se dozvědět více, neváhejte nás kontaktovat. Náš Product Manager se Vám ozve co nejdříve. Napište nám na adresu idm@cleverlance.com.

 

Effective identity administration and management

Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future.

Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. ACI will help you avoid these problems.

In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved.

Wouldn’t it be better to control identities automatically and centrally from one place?

ACI is the solution that will enable you to do this!

 

 

ACI

ACI - Identity Management System (IDM) by Cleverlance, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.

 
 
 
 
 

All operations and changes in identity management are recorded in detail and quickly plus clearly accessible in the history view.

History

We provide our customers with a complete professional IT consulting and implementation service.

 

Consulting

 

Easy

Our IDM is easy to control and administer – ACI controls accounts in a complex way and from one location.

 

We do not place a burden on your organization's budget with high licensing fees like other expensive commercial solutions.

 

Efficiency

 

 
 
 
 
 
 
 
 
 

Employee’s Story

MRS SMITH’S FIRST DAY ON THE JOB

Mrs Smith starts a new job today as an assistant in the sales department. When it comes to new employees, many companies use printed check lists where Mrs Smith’s subordinate checks what systems and with what permissions Mrs Smith should have access to. The request then goes to the IT department. What software tools will you use to give her access to everything she is going to work with?

WHAT MRS SMITH NEEDS WHEN SHE STARTS ON THE JOB

Access to the organization – creating an employee card (adding it into the card system), getting access to the “computer” (adding it to the directory service), setting up an e-mail account and intranet portal access (adding her to the intranet portal and setting appropriate permissions), setting up CRM access (adding her to CRM and setting appropriate permissions), setting up access to work reporting system (adding her to the attendance system and setting appropriate permissions), setting up access to relevant folders and documents in the organization (setting file and management system permissions), adding her into the payroll system. Quite a lot of things, right?

TWO MONTHS LATER …

Mrs. Smith unfortunately did not prove her abilities and is dismissed in her trial period. How easily, quickly and reliably will you be able to deactivate all of her access rights? Can it happen that she will still be able to enter the systems remotely after the termination of her contract?


 
 
 
 

Benefits for managers

BENEFITS
FOR IT MANAGERS

  • Enhancing access control security in the organization and its central administration.
  • Accelerating implementation of organizational, technical, and legislative changes and requirements.
  • Consolidating organizational structure, accounts, and authorization data, as part of the implementation of the solution.
  • Clear reporting and preparation of materials for security audit.

BENEFITS
FOR HR MANAGERS

  • Accelerating processes related to employee onboarding and offboarding.
  • Improving lifecycle management possibilities and employee development in the organization.
  • Enabling custom identity management in a modern user organization.
  • Boosting employee satisfaction and the image of a modern organization to recruit prospective, young people.

BENEFITS
FOR MANAGEMENT

  • Accelerating and streamlining internal processes, reducing costs (automation).
  • Enhancing security of access to information and data of the organization.
  • Increasing work productivity – secure access for home-office or field workers.
  • Greater flexibility for organizational changes and changes in employee permissions.
WHAT IS HAPPENING IN THE ORGANIZATIONWITH ACIWITHOUT ACI
Time to change/reset the passwordIn secondsIn hours
Duration of execution of changes within the organizational structureIn hoursIn weeks
IT operations related to permission administrationCost reduction by 10 to 30%-
Helpdesk/call centre operationsCost reduction by 10 to 30%-
Employee downtime while waiting for necessary permissionsCost reduction by 2 to 10%-
Preparation of documents for security auditCost reduction by 60 to 90%-
Costs associated with security threatsSavings can be clearly quantified after evaluating assets, security risks and threats when performing a security analysis.-
Costs associated with unused account and license feesSavings are associated with licensing of 1 user in the organization (e.g. CZK 750 = for 40 unconfirmed users CZK 30,000).-
 
 

References for inspiration

 
 
 
 
 
 

Contact us

If you are interested in our product and want learn more, please do not hesitate to contact us.

Our Product Manager will get in touch with you as soon as possible.

Write to idm@cleverlance.com.