Identity management - PowerPoint PPT Presentation

About This Presentation
Title:

Identity management

Description:

With SSO, Two-Factor Authentication and the functionalities regarding provisioning/deprovisioning, it protects the identity of every user account based on roles and authorisations. – PowerPoint PPT presentation

Number of Views:80
Slides: 8
Provided by: hardiksoni
Category: Other

less

Transcript and Presenter's Notes

Title: Identity management


1
CENTRALIZED AND RISK BASED IDM
  • ProactEye Team

2
PROACTEYE BRIEF - CENTRALISED AND RISK BASED
IDM
3
CENTRALIZED AND RISK BASED IDM-Brief
4
PROACTEYE Benefits of IDM to Client
Centralized access management
Improved end-user experience by using a single unique ID and enterprise password to access applications instead of the need to remember multiple usernames/passwords Upon implementation of this solution, customers can use the self-service capabilities to reset forgotten passwords Increase administration efficiency by automating account deprovisioning at multiple resources when a user is terminated Centralizing authentication will help enterprises meet regulatory compliance through timely termination / deactivation of user accounts Unified reporting and monitoring, security and scalability
Risk based access management
Proactive fraud prevention Risk-based access management mitigates the risks with traditional authentication by using a dynamic authentication based on the risk of the transaction Real-time risk analysis based on contextual factors like location, device and behavioral profiling helps in proactively preventing fraud RBAM provides higher level of assurance that the users accessing the applications by verifying users identity before allowing access to the applications Provides virtual authentication features like Keypad to prevent phishing and malware threats
5
PROACTEYE Why Us
Centralized access management
Improved end-user experience by using a single unique ID and enterprise password to access applications instead of the need to remember multiple usernames/passwords Upon implementation of this solution, customers can use the self-service capabilities to reset forgotten passwords Increase administration efficiency by automating account deprovisioning at multiple resources when a user is terminated Centralizing authentication will help enterprises meet regulatory compliance through timely termination / deactivation of user accounts Unified reporting and monitoring, security and scalability
Risk based access management
Proactive fraud prevention Risk-based access management mitigates the risks with traditional authentication by using a dynamic authentication based on the risk of the transaction Real-time risk analysis based on contextual factors like location, device and behavioral profiling helps in proactively preventing fraud RBAM provides higher level of assurance that the users accessing the applications by verifying users identity before allowing access to the applications Provides virtual authentication features like Keypad to prevent phishing and malware threats
6
USE CASE - IDENTITY MANAGEMENT
  • Centralize User Management for Access Controls
  • Centralize Provisioning/De-Provisioning to Access
    Controls
  • Single Access Cards to Different Access Controls
  • Centralize Visitor Management and Access
    Visibility

7
USE CASE - ACCESS MANAGEMENT
  • Single Sign on for Different Access Controls and
    Applications
  • Centralize Access Management for Employees and
    Visitors
  • One ID for Access and Tracking
Write a Comment
User Comments (0)
About PowerShow.com