Category Archives: Identity Access Management

Visit AlertEnterprise at the Gartner Identity & Access Management Summit 2014


This entry was posted by on .

gartner 2014

Gartner Identity
& Access Management Summit 2014
December 2-4, 2014
Las Vegas, NV

AlertEnterprise will showcase featured solutions for Enterprise Identity and Access Management at the Gartner IAM Summit in Las Vegas.

AlertEnterprise extends capabilities beyond simple PACS integration to deliver true Enterprise Identity and Access Management, inclusive of Identity and Access Governance. Unlike other solutions that provision access to PACS-only, AlertEnterprise additionally provisions identities for logical access to enterprise systems and control system applications.

read more

Unlock All or Lock All User Accounts in IDM


This entry was posted by on .

How to Enable and Disable User Accounts for Duration to Achieve Better Security

Let us assume there is an employee who has access to critical systems and applications,  but now he is going on leave for 10 days.

lock_unlock_user_accounts_for duration

For all ten days all the user accounts and access levels are enabled for this employee, so there is a chance of risk of unathorized access. Anyone can misuse these access rights / levels as the employee is on leave.

The IDM provides a solution which will automatically disables / locks / scrambles the password for these ten days and the application will automatically Enable / Unlock all the accounts once employee returns from Leave.

read more

IAM: Providing Access to the Right People


This entry was posted by on .

“Role” can be defined as a technical phrase being used for the collection of individual privileges (access to company assets) which are assigned to an individual to perform his job. AlertEnterprise delivers a unique solution for Role Management across various external systems including physical & logical.

role_management_AlertEnterprise

Eg. When any person joins the organization, apart from creating/managing his digital identity, it is equally important to provide access to the devices (physical/logical) where he is supposed to work. Both of these things are well managed by the Role Module incorporated into the AlertEnterprise application.

read more