MADE IN GERMANY
bi-Cube IAM was developed by a German software house. It has been successfully deployed in medium and large enterprises for nearly 20 years, and is available in three operating modes: in-house
installation, managed service, and Software as a Service (SaaS).
For in-house installations we provide a tried and tested procedure (workshop, pilot, implementation), as well as certified training for administrators.
The bi-Cube® Product Suite:
A Short Introduction
The bi-Cube product suite is a software solution for the centralized management of users, their permissions and resources.
It is an Identity & Access Management system (IAM), significantly improving security and adherence to compliance requirements.
Who is permitted to do what, when, where, and with whose authorization?
bi-Cube puts you in control of who has access to which data, applications, devices and secure areas.
The user is given the appropriate access following unambiguous identification, which may be by means of user name and password, biometric fingerprint, smartcard or token.
When managing identities and permissions it is essential to ensure that security policies, statutory regulations and compliance requirements are observed at all times. With the increasing use of mobile devices and cloud applications, this IT task is becoming ever more complex and ever more important.
bi-Cube sits on top of all systems that can administer permissions. From this central position all users can be managed, along with their permissions and resources – and not just within the static organizational structure, but in dynamic structures such as teams, projects and temporary user pools, too.
Added value for management
bi-Cube IAM combines user permissions in roles. This has the advantage of greatly simplifying your access management and making it transparent. At any time, you can see who is permitted to do what, when and where, and with whose authorization. This data is also stored historically, reducing the liability risk for boards and directors. Suspicious occurrences can be detected and risks avoided.
With bi-Cube managers can respond to queries from internal and external auditors at the touch of a button. In short, bi-Cube keeps your business safe.
An intelligent rule system directs the business processes
Rule definition is straightforward and requires no programming. The resulting rules are then applied using automated processes. These processes are highly sophisticated and are supplied ready to use. Better still, they make it possible to make administration savings of up to 80%.
Thanks to its high degree of automation, its intelligent rule system and its close fit with real-life corporate practice, bi-Cube makes it much easier for your business to meet its compliance and data protection obligations. In the process, it also makes a significant contribution to cost reduction.
The benefits start in the architecture
bi-Cube’s modular structure makes implementation both straightforward and flexible. You only pay for the modules you actually need, and you can phase in further functionality as required. Our unique open architecture lets you provision all your systems using bi-Cube as a data hub.
bi-Cube is well established in the marketplace and we maintain close contact with our customers. As a result we are able to provide a very broad spectrum of functionality, which we are adding to all the time. This not only includes a complete Single Sign-On solution but also, among other things, modules for controlling the use of external and internal storage media, mobile device management, and internal license control.
bi-Cube at a glance:
- Identity & Access Management
- For nearly 20 years in the IAM market
- Intelligent rule system
- Modular architecture
- Made in Germany
Exhibitor videoPlay video
iSM Secu-Sys AG offers you products from these product groups:
- Access protection (28)
- Asset management/ IT documentation (30)
- BSI IT baseline protection (products and services) (90)
- Cloud (computing) security (154)
- Compliance/GRC (products and services) (117)
- Data protection (products and services) (166)
- Digital/Enterprise Rights Management (DRM/ERM) (15)
- Document management (17)
- Forensics (64)
- Identity and access management (100)
- Managed security services (76)
- Mobile security (84)
- Network Access Control (NAC) (36)
- Network monitoring (57)
- Risk analysis and management (67)
- Security management (59)
- Single sign-on (23)
- Token systems (13)
- User (rights) administration (37)
- Web application security (60)