Effective identity administration and management

Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future.

Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. ACI will help you avoid these problems.

In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved.

Wouldn’t it be better to control identities automatically and centrally from one place?

ACI is the solution that will enable you to do this!

ACI - Identity Management System (IDM) by Cleverlance, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.

Consulting

We provide our customers with a complete professional IT consulting and implementation service.

Easy

Our IDM is easy to control and administer – ACI controls accounts in a complex way and from one location.

We offer a set of connectors for individual applications in your organization.

Efficiency

We do not place a burden on your organization's budget with high licensing fees like other expensive commercial solutions.

History

All operations and changes in identity management are recorded in detail and quickly plus clearly accessible in the history view.

References

AGROTEC

Implementation of the AC Identity management system, including integration with SAP, Active Directory, MS Exchange, SharePoint company portal, including implemented applications (e.g. contract module).AC Identity effectively controls the identity life cycle in Agrotec and its subsidiaries. Besides that, AC Identity primarily controls user permissions on the Intranet and SharePoint contract module.

JIHOČESKÝ KRAJ

Implementation of the ACI identity management system for administration of the regional office internal identities, as well as external identities of its established organizations including its interconnection with key regional authority systems, such as Human Resources system, Records Management System, Company directory, and E-mail, but for example also the platform for communication with basic registers and the integration platform.

Permissions in 24 regional authority systems are under ACI central and automated control.

DPP

The goal of the project was creation of user central administration for Dopravní podnik hl. m. Prahy (the Prague Public Transport Company). Due to integration with individual systems, IDM efficiently manages identity life cycles in more than 120 applications, including PMS, Active Directory, SharePoint, MS Exchange, Helpdesk, Electronic Records Management, CSU, and many more.

Thus, in DPP, they have an overview of internal and external user permissions in one place allowing for their automated and efficient management.

BANKA CREDITAS

The designed solution reflected requirements of Creditas Bank regarding identity management in its interconnected systems. It was necessary to conduct a detailed analysis of each application first in order to enable the subsequent implementation of the IDM solution, Notification modules, and automatic rules to efficiently manage the entire identity life cycle in the company.

Contact us

If you are interested in our product and want learn more, please do not hesitate to contact us. Our Product Manager will get in touch with you as soon as possible. Write to idm@cleverlance.com.

 

Effective identity administration and management

Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future.

Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. ACI will help you avoid these problems.

In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved.

Wouldn’t it be better to control identities automatically and centrally from one place?

ACI is the solution that will enable you to do this!

 

 

ACI

ACI - Identity Management System (IDM) by Cleverlance, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.

 
 
 
 
 

All operations and changes in identity management are recorded in detail and quickly plus clearly accessible in the history view.

History

We provide our customers with a complete professional IT consulting and implementation service.

 

Consulting

 

Easy

Our IDM is easy to control and administer – ACI controls accounts in a complex way and from one location.

 

We do not place a burden on your organization's budget with high licensing fees like other expensive commercial solutions.

 

Efficiency

 

 
 
 
 
 
 
 
 
 

Employee’s Story

MRS SMITH’S FIRST DAY ON THE JOB

Mrs Smith starts a new job today as an assistant in the sales department. When it comes to new employees, many companies use printed check lists where Mrs Smith’s subordinate checks what systems and with what permissions Mrs Smith should have access to. The request then goes to the IT department. What software tools will you use to give her access to everything she is going to work with?

WHAT MRS SMITH NEEDS WHEN SHE STARTS ON THE JOB

Access to the organization – creating an employee card (adding it into the card system), getting access to the “computer” (adding it to the directory service), setting up an e-mail account and intranet portal access (adding her to the intranet portal and setting appropriate permissions), setting up CRM access (adding her to CRM and setting appropriate permissions), setting up access to work reporting system (adding her to the attendance system and setting appropriate permissions), setting up access to relevant folders and documents in the organization (setting file and management system permissions), adding her into the payroll system. Quite a lot of things, right?

TWO MONTHS LATER …

Mrs. Smith unfortunately did not prove her abilities and is dismissed in her trial period. How easily, quickly and reliably will you be able to deactivate all of her access rights? Can it happen that she will still be able to enter the systems remotely after the termination of her contract?


 
 
 
 

Benefits for managers

BENEFITS
FOR IT MANAGERS

  • Enhancing access control security in the organization and its central administration.
  • Accelerating implementation of organizational, technical, and legislative changes and requirements.
  • Consolidating organizational structure, accounts, and authorization data, as part of the implementation of the solution.
  • Clear reporting and preparation of materials for security audit.

BENEFITS
FOR HR MANAGERS

  • Accelerating processes related to employee onboarding and offboarding.
  • Improving lifecycle management possibilities and employee development in the organization.
  • Enabling custom identity management in a modern user organization.
  • Boosting employee satisfaction and the image of a modern organization to recruit prospective, young people.

BENEFITS
FOR MANAGEMENT

  • Accelerating and streamlining internal processes, reducing costs (automation).
  • Enhancing security of access to information and data of the organization.
  • Increasing work productivity – secure access for home-office or field workers.
  • Greater flexibility for organizational changes and changes in employee permissions.
WHAT IS HAPPENING IN THE ORGANIZATIONWITH ACIWITHOUT ACI
Time to change/reset the passwordIn secondsIn hours
Duration of execution of changes within the organizational structureIn hoursIn weeks
IT operations related to permission administrationCost reduction by 10 to 30%-
Helpdesk/call centre operationsCost reduction by 10 to 30%-
Employee downtime while waiting for necessary permissionsCost reduction by 2 to 10%-
Preparation of documents for security auditCost reduction by 60 to 90%-
Costs associated with security threatsSavings can be clearly quantified after evaluating assets, security risks and threats when performing a security analysis.-
Costs associated with unused account and license feesSavings are associated with licensing of 1 user in the organization (e.g. CZK 750 = for 40 unconfirmed users CZK 30,000).-
 
 

References for inspiration

 
 
 
 
 
 

Contact us

If you are interested in our product and want learn more, please do not hesitate to contact us.

Our Product Manager will get in touch with you as soon as possible.

Write to idm@cleverlance.com.