WHO HAS PERMISSION TO DO WHAT ON THE COMPANY NETWORK?
In order to meet the growing demand for IT services, more and more companies are automating routine IT tasks and service request processes. This requires reliable management of all users and their permissions and is the only way to protect services and information from unauthorized access.
econet’s Identity & Service Manager achieves this by standardizing and automating routine tasks regarding user/permissions management and the supply of IT services such as file services, mailboxes, software distribution and telephony. This goes beyond individual tasks to incorporate entire process chains. Far fewer resources are used and error rates drop considerably compared to manual processing. The process traceability this provides is required to fulfill key legal requirements
Departments manage permissions themselves
The individual departments know who requires which information, applications and systems for their work. Consequently, they are the ones who should be able to control who has access to what. econet’s Identity & Service Manager provides them not only with controlled self-service functions to manage their permissions, but also allows them to apply for resources such as file archives or SharePoint sites for themselves and others. Authorization procedures automatically include the appropriate administrators. IT administration is relieved of these tasks in favor of more productive work.
Automating identity management and supporting IT service processes
- Automating identity and access administration considerably reduces costs and risks compared to manual administration
- Quick and secure provisioning of IT services, particularly – but by no means exclusively – in relation to Microsoft’s Active Directory and Windows infrastructures
- Proven best practices for user services, file services, mail services, SharePoint services, SAP services, voice services, and computer and software services keep effort and costs in check
- Highly rule-based approach provides the necessary flexibility – technology serves business logic, not vice versa
- Role-based authorization ensures greater security and relieves administration
- Comprehensive self-service functions: End-to-end automated authorization procedures for web-based applications for role permissions, special rights, resources and independently resetting passwords, password reset management
- Integration in Microsoft Forefront Identity Manager: Provisioning file services, SharePoint, SAP and voice services.
- Administration of hybrid Cloud services: Mixture of on-site and Cloud-hosted applications
- Delegating administrative tasks to non-IT professionals reduces effort and costs
- Service management orientation: In addition to identities and permissions administration, automated set-up of network resources such as file archives and SharePoint pages
- Powerful reporting functions: Continuous monitoring of access rights for access governance, risk management and compliance
- Multi-tenancy: Customized permissions models and processes for use by IT service providers and shared services centers
- Graphic process editor for designing even complex processes
- Helpdesk support: Provides all the necessary information and functions
- Communicates with all state-of-the-art systems: Consistent use of web services for interoperability, such as with other workflow systems, for integration in existing web portals, quick connection of new target systems, etc..