SAM

System Access Manager

Identity management system

The key to security

The SAM provides the following benefits for your company:

SAM_tulajd1

Centralized and uniform permission management

The SAM identity management (IDM) system stores enterprise permissions, ensures their quick and easy requesting process, and logs changes occurring to them. It achieves this by centrally storing employee and permission data, and by contolling the requesting process.

Permission change requests are handled uniformly with Role Based Access Control.

Well-organized, transparent requesting processes

Through its three-phase access management process of requesting-approval-fulfillment, the SAM provides orderly, transparent process control with detailed status tracking.

Based on the logical rules stored in the system, the requesting process can be fine-tuned as desired. The SAM can control either simple requests with manual fulfillment or processes with complex automations that require multi-stage approval.

This quick and secure process is supported by e-mails sent at certain stages to involved employees.

SAM_tulajd1
SAM_tulajd1

Up-to-date and retrospective data provision

With the SAM, you can find out at any time what permissions a person currently has, or vice versa: who exactly has permission to a protected resource at the moment? The system will also provide this information regarding any time in the past.

By using connectors, the SAM is able to support auditing of enterprise permissions by comparing the permissions stored in the SAM database with the ones in the source systems and generating a report of discrepancies.

Automation

The SAM is able to connect to other systems (e.g., Active Directory, Oracle DB, etc.) through fulfillment connectors and make authorization changes, greatly increasing automation.

The system sends automatic notifications about the status of requests during processing, thus shortening the turnaround time for permission modification processes.

SAM’s diverse and flexible rule system is also able to trigger assignement and revocation requests automatically.

SAM_tulajd1
SAM_tulajd1

Multiphase implementation and integration

SAM supports quick win implementation, so its basic functions are easy to introduce in the company. Because the basic version includes all the necessary modules and functions to get started, the system can be used quickly.

After the introduction of the basic version, several connectors, interfaces and modules – can be gradually implemented, elevating the permission management of the company to the next level.

If required, the system’s customizable HR interface ensures continuous synchronization of employees and the organizational hierarchy.

 

Advantages

Security

IT security gets a complete picture of all permissions, including those that are hidden or unknown, thus eliminating vulnerabilities and reducing risks.

Regulation

Users can own the necessary and sufficient permissions to perform the tasks associated with their position and job.

Efficiency

Automations make the permission requesting processes quicker and more efficient.

Transparency

SAM makes a company’s authorization management structure transparent through easy-to-trace requesting processes.

Cost reduction

Automatic fulfillment reduces administration time, freeing up IT resources.

Digitalization

User permissions are managed in digital form, which is one of the foundations of the company’s digital transformation.

Do you have any questions?

Contact us!

Informa Számítástechnikai és Szolgáltató Kft.

Phone

+36 74 565 669

+36 30 277 36 85

Address

Headquarters:
1092 Budapest, Kinizsi u. 21-25. IV. em.

Site:
7200 Dombóvár, Árnyas u. 28.