ENTERPRISE SECURITY MANAGEMENT



User Security Management

Overview

Puleng Technologies is a specialist Identity and Access Governance Management Company, with over five million user identities under management and the largest number of enterprise environments in production in South Africa. A strong User Governance framework is the thread which ensures that the right Users have access to the right Services while providing business advantage through self-enrolment, user life-cycle and a quality customer experience. Identity management is a foundational security component to help ensure users have the access they need, and that systems, data, and applications are inaccessible to unauthorised users.

Identity and access management organisational policies define:
  • How users are identified and the roles they are then assigned.
  • The systems, information, and other areas protected by IAM.
  • The correct levels of protection and access for sensitive data, systems, information, and locations.
  • Adding, removing, and amending individuals in the IAM system.
  • Adding, removing, and amending a role’s access rights in the IAM system.

Speak to a Consultant

All fields are required!

IDENTITY MANAGEMENT
IDENTITY MANAGEMENT


Identity management provides self-service for users, automated lifecycle management across heterogeneous platforms. Identity Management facilitates a rich policy framework for enforcing corporate security policies and enabling detailed audit capabilities. This protects IT infrastructure from information theft and helps the organisation to comply with regulations.
Identity management facilitates the creation, automation and enforcement of business policies that strengthen security.

 

ACCESS MANAGEMENT
ACCESS MANAGEMENT


Access management solutions securely manage access to business-critical applications and data. These solutions provide centralised authentication and authorisation, policy management and access control services for Web resources, systems and hosted applications. Single Sign-On (SSO) improves the user experience and reduces help-desk costs.
Centralise the management of two-factor authentication functions, security tokens and user across the enterprise.

 

ACCESS GOVERNANCE
ACCESS GOVERNANCE


Access Governance offers visibility regarding who has access to what information resources within an organisation. Governance implies that the control of access is driven by policy as well as procedure. Access Governance systems are of significant importance to enterprises due to an increased emphasis on regulatory compliance and heightened sensitivity to insider threat.
IT organisations can reduce access management complexity and increase operational efficiency while minimising risk and ensuring compliance.

 

FEDERATED IDENTITY AND CLOUD MANAGEMENT
FEDERATED IDENTITY AND CLOUD MANAGEMENT


Federated Identity Management provides web and federated single sign-on (SSO) to end users across multiple applications. Browser based integration and open standards provides short term gains in user productivity, user experience and reduction in administration costs. Enterprises adopting cloud based services can leverage federated single sign-on for secure information sharing across private, public and hybrid cloud deployments.
Implement a powerful identity mediation service for Cloud, SaaS and Web services.

 

PRIVILEGED ACCESS MANAGEMENT
PRIVILEGED ACCESS MANAGEMENT


A privileged account is typically the administrator, super-user or root account for a given system and provides the capability, not only to reconfigure and/or apply modifications to a system and/or its components, but also to access any information that is held on the system. Security and management of these privileged accounts is a priority for all enterprises.
When users require use of a privileged account, the "Username" and "Password" is booked-out from the automated self-service Password Safe.