With so many devices, software licenses and access points across your enterprise, a solid identity management service ensures only authorized users can access the proper assets. Regardless of whether a user is seeking permission for a network-based program or an internet application, your role-based provisioning is stored and managed. And, all those users; all those applications–too many passwords to effectively administer.–CloudAccess provides a secure and easy way to manage and synchronize credentials throughout the enterprise.
Identity Management is full-featured cloud-based offering that addresses many challenges facing enterprises. It allows organizations of all sizes to successfully:
FROM OUR BLOG: Read about the difference between identity and access management
FROM OUR BLOG: Read about the “secret sauce” of user provisioning
Cloud computing has been around for years, the cost of traditional identity management products (hardware, software licenses and deployment) as well as lack of resources and expertise has made it difficult for many organizations to take advantage of the significant opportunities that cloud computing brings to an enterprise. With the popularity of cloud model and SaaS applications the need for an affordable, manageable identity management products to oversee users and user access to applications, both within the enterprise and in the cloud, is even more evident. A true “designed-for-the-cloud” solution, Cloud Identity Management helps address many of the business and resource issues associated with cloud computing. Designed to operate in highly distributed multi-tenant cloud environments for any size organization, CloudAccess’ identity management products reduce the cost and the complexity of extending internal infrastructure to external SaaS and cloud application
In addition to cloud-based security advantages, CloudAccess Identity Management: reduces IT cost, meets compliance requirements easily and quickly, provides a better user experience, with improved administration and operational efficiencies, enabling you to focus on your core competencies. It promotes managing identity in the cloud. Some of the specific benefits include:
Fast Deployment. Unlike traditional security solutions Identity Management is deployed in hours or days depending on the number of applications or users. There is no hardware or software installation required.
Audit, Compliance and Reporting. Federated and interoperable identity infrastructures dramatically simplify the task of monitoring and documenting policy compliance. CloudAccess Identity Management allows businesses to gain in-depth visibility into user access across on-premise and Cloud applications for security, audit reporting and compliance. CloudAccess provides extensive and granular audit and reporting capabilities to meet any operational, legal, or compliance requirements, whether you need to meet PCI, HIPAA, SOX, or other compliance requirements. With out-of-the-box compliance reports you can easily and quickly generate reports to meet audit requirements saving time, money and valuable resources.
Interoperability. Designed from ground up for cloud and for a multi-tenant environment, CloudAccess Identity Manager meets or exceeds industry standards allowing organizations to enable security for internal and web-based applications regardless of the application platforms, access protocols, or existing identity infrastructure.
Reduced IT Complexity and Cost. CloudAccess Identity Management allows for provisioning and de-provisioning users automatically. No more spreadsheet and human resources required to enable application access for new users or when user roles have changed. Reduce the helpdesk cost and IT support with user self-service capabilities to manage passwords. With our out-of-the-box connectors and the Role Management function, you can setup access automatically based on user roles.
Enhanced Security. Whenever a user’s role or access rights is changed, their levels of access to all applications including web, SaaS and internal enterprise applications are adjusted automatically and immediately. The modular but integrated design of SingleSource provides a centralized policy management.
On-Demand Scalable Pay-As-You-Go Service. All You Need is a Browser. With pay-as-you-go per-user per-month subscription model, there are no license fees, hardware, or professional services costs. Getting to your applications and managing them is easy with our portal. Add users and applications in a simple step in the administration console. Connection to your applications can easily be achieved with out-of-the-box connectors that are provided for most major applications. Software upgrades are automatic. CloudAccess web-based administration allows for automated account management, connection control, reports and audit support.
Not Just Identity Management, Integrated Modular System Supporting Your Growth. Unlike other available products, CloudAccess SingleSource platform provides a comprehensive suite of products to address Web SSO, SaaS SSO, Identity Management, SIEM and Log Management. Start with Identity Management and add other modules later. Manage all your Intranet and Internet applications from one management console enabling centralized access control, from public and private clouds. CloudAccess provides the same cloud philosophy for all modules in the suite. You can add SIEM and Log Management at any time for any number of users or devices and scale up or down as needed. This is the power of CloudAccess comprehensive security in the cloud.
Proven Technology. CloudAccess technology has been successfully utilized in large organizations and government agencies supporting millions of users. CloudAccess Identity Manager is a multi-tenant, high performance and scalable system built on the latest SOA and web services technologies. There are no agents to install.
|Supported Browsers||Firefox 3+, IE 7+, Safari, Chrome|
|Authentication Repositories||OpenIAM, LDAP, Active Directory|
|Target System Connectors||
|Source Systems||Relational DatabaseLDAP and ActiveDirectory CSV Files|
|Workflow||Graphical designer using BPMN|
|Provisioning Models||Role Based ProvisioningRule Based Provisioning|
|Web Services||JAX-WS services|
|High Availability||Redundancy at each tier and scalable to large user counts|
Using Identity Management (IDaaS), you can connect to thousands of SAML and Non-SAML applications. The connectors listed here allow for federated provisioning (SAML, SAML-2). For specific information on our advanced adapters/connector, click the link to access a PDF datasheet.