user

Privileged Account Management

user

Authentication

user

Identity Governance

user

Federation and Access Management

 

User Security Management

Puleng Technologies is a specialist Identity and Access Governance Management Company, with over five million user identities under management and the largest number of enterprise environments in production in South Africa. A strong User Governance framework is the thread which ensures that the right Users have access to the right Services while providing business advantage through self-enrolment, user life-cycle and a quality customer experience. Identity management is a foundational security component to help ensure users have the access they need, and that systems, data, and applications are inaccessible to unauthorised users.

 

IDENTITY AND ACCESS MANAGEMENT ORGANISATIONAL POLICIES DEFINE:

How users are identified and the roles they are then assigned.

user security management

The systems, information, and other areas protected by IAM.

user security management

The correct levels of protection and access for sensitive data, systems, information, and locations.

user security management

Adding, removing, and amending individuals in the IAM system.

user security management

Adding, removing, and amending a role’s access rights in the IAM system.

user security management

Identity Management

Identity Management provides user self-service,  automated user – lifecycle management (i.e. joiner, mover and leaver) across heterogenous platforms, access reviews and separation of duty policies. It facilitates a rich policy framework for enforcing corporate security policies and enabling detailed audit capabilities.  

Identity ManagementIdentity Governance enables enterprise to meet organisational compliance and industry regulations by managing identities that interact with an organisations environment.

Access Management

Access management solutions securely manage access to business-critical applications and data. These solutions provide centralised authentication and authorisation, policy management and access control services for Web resources, systems and hosted applications. Single Sign-On (SSO) improves the user experience and reduces help-desk costs.
Centralise the management of two-factor authentication functions, security tokens and user across the enterprise.

Identity Governance

Identity Governance offers visibility regarding who has access to what information resources within an organisation. Governance implies that the control of access is driven by policy as well as procedure. Access Governance systems are of significant importance to enterprises due to an increased emphasis on regulatory compliance and heightened sensitivity to insider threat.
IT organisations can reduce access management complexity and increase operational efficiency while minimising risk and ensuring compliance.

Federated Identity and Cloud Management

Federated Identity Management provides web and federated single sign-on (SSO) to end users across multiple applications. Browser based integration and open standards provides short term gains in user productivity, user experience and reduction in administration costs. Enterprises adopting cloud based services can leverage federated single sign-on for secure information sharing across private, public and hybrid cloud deployments.
Implement a powerful identity mediation service for Cloud, SaaS and Web services.

Privileged Access Management

A privileged account is typically the administrator, super-user or root account for a given system and provides the capability, not only to reconfigure and/or apply modifications to a system and/or its components, but also to access any information that is held on the system. Security and management of these privileged accounts is a priority for all enterprises.
When users require use of a privileged account, the “Username” and “Password” is booked-out from the automated self-service Password Safe.