Category Archives: Identity Management

Visit AlertEnterprise at the Gartner Identity & Access Management Summit 2014


This entry was posted by on .

gartner 2014

Gartner Identity
& Access Management Summit 2014
December 2-4, 2014
Las Vegas, NV

AlertEnterprise will showcase featured solutions for Enterprise Identity and Access Management at the Gartner IAM Summit in Las Vegas.

AlertEnterprise extends capabilities beyond simple PACS integration to deliver true Enterprise Identity and Access Management, inclusive of Identity and Access Governance. Unlike other solutions that provision access to PACS-only, AlertEnterprise additionally provisions identities for logical access to enterprise systems and control system applications.

read more

Unlock All or Lock All User Accounts in IDM


This entry was posted by on .

How to Enable and Disable User Accounts for Duration to Achieve Better Security

Let us assume there is an employee who has access to critical systems and applications,  but now he is going on leave for 10 days.

lock_unlock_user_accounts_for duration

For all ten days all the user accounts and access levels are enabled for this employee, so there is a chance of risk of unathorized access. Anyone can misuse these access rights / levels as the employee is on leave.

The IDM provides a solution which will automatically disables / locks / scrambles the password for these ten days and the application will automatically Enable / Unlock all the accounts once employee returns from Leave.

read more

AlertEnterprise named to Top 10 Most Innovative at RSA 2009 Conference


This entry was posted by on .

Most industry security experts are generally aware that physical access security, IT security, and critical infrastructure security, all reside in silos. This is a huge challenge for timely detection of terrorist events, malicious behavior and fraudulent activity. Jasvir Gill, founder and CEO of AlertEnterprise takes this mission to heart. His previous startup Virsa Systems was one of the most successful acquisitions by SAP to date and has became the heart of the SAP GRC offering delivering application level security. “The most insidious risks are simple acts that slip between physical and logical security systems. They may not individually trigger an alert in any one system. But, in combination they create a risk that may defy detection unless your physical and logical security systems talk to each other,” says Jasvir.

read more