IT Security & Identity Access Management
Security Analysis and Recommendations
Identity & Access Management as Part of Your IT Security
IAM / CIAM / IoT Services
-
Planning, development and rollout of IAM solutions
-
Consulting, implementation and operation of leading Identity & Access Management (IAM) systems
-
From Junior to Architecture Consultants
-
Proprietary procedure to select and implement an IAM solution
-
Role based access control (RBAC) based on permissions and entitlements by role
-
Password Management, synchronization and SSO
-
Access governance
-
Enhancement of existing IAM solutions and policies
-
Authorization and Authentication
-
Customer IAM (CIAM) solutions
- Data Analysis and Classification
IT-Security Services
-
Security Analysis/ Security Information and Event Management (SIEM)
-
Encryption solutions
-
Security assessments
-
Vulnerability checks
-
Internal and external penetration tests
-
Security recommendations
-
Security architecture engineering
-
Security solutions, implementation and operation
-
Consulting and implementation of SOC (Security Operation Center)