Versos ... Providing what matters

Identity and Access Management (IAM)

The means by which an organization secures access to its systems and applications is changing. Todayís diverse communities of users all need access to the right information at the right time. And yet these communities of users access the systems from many different locations, all with varying levels of security. To respond to this, IT departments need to personalize their security systems to the user.

An Identity & Access Management system administers the authentication, authorization and entitlement of users to access an organizationís information. It identifies the user, determines what the user can access, determines what the user can do, and protects the information by signalling when the security has been compromised. However, an Identity & Access Management system needs to do more than simply regulate access, it must also manage the life cycle of the user access. Otherwise, every time a customer, vendor or employee changes, the process of changing privileges would waste staff time and drive up costs. To handle these different requirements, an Identity & Privilege Management system is composed of five different parts:

  • Directory Services provide a central repository of identity details
  • Identity Management provides tools to manage those details
  • Access Management implements authentication of users
  • Authorization Services provides control over the actions of the users, and
  • Provisioning Services directs the centralized user administration and propagates user accounts and access rights across multiple applications.

At Versos we have partnered with leading Identity and Access Management vendors in the industry to offer our clients the best of bread in this technology domain. Such partnerships allowed us to build a strong practice of IAM. In our vision, identity management technology works as an enterprise infrastructure connecting and integrating various technology and departmental islands. From the technical perspective, identity infrastructure consists of user security and registration functionality that is underpinned by directory and integration services and supported by advanced administration services. Related business processes and services then leverage the identity infrastructure. Our partners cover the following key technologies:

  • Access Management
  • Single Sign On
  • Multifactor authentication including:
    • Biometric
    • RFID
    • Smart Cards
    • On-time password generators
  • Unified Access Control
  • Out of Band Network Access Control
  • Resources Access Control
  • Remote Authentication Dial-In User Service (RADIUS)
  • Role Based Access Control (RBAC) Unified Access Control
  • Identity Management
  • Identity Directory
  • Directory Synchronization & Visualization
  • User Administration & Provisioning
  • Self-service Password Management (end-user)
  • Workflow Management
  • Extended Role Based Access Control (E-RBAC) Workflow Management
Identity and Access Management