Product & Service
“We want you to know that we care about our valued customers,
so that we are here to serve you with our reliable services as well
as our wide selection of products. We are currently holding the partnership
of Intel Security, Cyber-Ark, SailPoint, Tufin, Infoblox, Aruba,Tripwire, Fortinet, and
Forcepoint. We also provide all services that are related to these
product implementations, from implementation,
maintenance, and support services.”
Aplikas Servis Pesona offers world-class products among others:
SailPoint IdentityIQ is a complete governance- based identity and access management solution that provides fast, convenient application access that keeps business users productive, and access controls that keep the business safe.
IdentityIQ provides a fully automated, repeatable certification process and tracks and reports on the status of certifications by individual, application and organizational groups. IdentityIQ automates all access certification task including formatting of user role and entitlement data into easy-to-read, business- oriented reports; routing of reports to the appropriate reviewers; tracking reviewer progress and actions; and archiving certification reports and data
IdentityIQ makes it easy for business and IT managers to define access policy across roles and entitlements using point-and-click interfaces. IdentityIQ validates users’ existing access privileges against a wide variety of policy types, including entitlement and role separation-of-duty (SoD) policies, application/account-based policies, activity policies and risk-based policies.
IdentityIQ enables compliance administrators, auditors and business managers to get the information they need on-demand from reports and personalized dashboards with data presented in a simple to use, business-friendly format. IdentityIQ also provides advanced analytics that allow for direct, customized queries, along with integration to third-party reporting and GRC tools
IdentityIQ provides a user-friendly solution for managing access requests. Users are guided to the right access through the IdentityIQ Request Advisor, which leverages Google-like keyword search and affinity-based search options that locate privileges based on what other business users have. Once users have selected access to request, they can review their shopping cart and check out using an intuitive e-commerce interface.
Users can self-manage passwords from its business-friendly interface, greatly reducing calls to the help desk and IT support. End users can automatically change passwords across multiple systems or recover forgotten passwords by correctly answering challenge/response questions, and managers and administrators can reset end user passwords
By allowing organizations to request, approve, define policy and certify access using business roles rather than low-level technical entitlements, the IdentityIQ Role Model reduces complexity and simplifies user adminis- tration while enforcing “least privileged” access. With a combination of top-down, business-oriented role mining and bottom-up IT role mining, business and technical users can quickly create roles that accurately reflect the organization’s business and IT requirements.
The Risk Model locates and identifies areas of risk created by users with inappropriate or excessive access privileges. It provides a dynamic risk model, for both users and applications, which leverages patent-pending risk algorithms to calculate and assign a unique identity risk score for each user, application and system resource. The risk score is updated continuously based on changes to the user’s access privileges, as well as “compensating factors,” such as how recently the user has been certified and whether a policy violation has been allowed as an exception. By leveraging risk scores, managers and application owners can target the highest-risk users or systems first, improving the effectiveness of controls for their departments and, ultimately, the security and compliance of the business
IdentityIQ provides a flexible Connectivity Foundation with pre-built integration to over 80 cloud and on-premises resources, along with integration options for other provisioning vehicles, such as third-party provisioning tools, service desk systems, and even manual provisioning processes. IdentityIQ seamlessly orchestrates how changes get fulfilled across multiple fulfillment mechanisms, giving organizations maximum flexibility to provision changes in whatever way they choose.
IdentityNOW
Provides users with enterprise-grade identity governance capabilities that are always available, always up-to-date and accessible from any device, at any time. And since it’s delivered from the cloud, it can be up and running quickly with no additional hardware or software to buy, deploy and maintain.
By delivering user-friendly options to change existing passwords or recovering forgotten ones, you can eliminate the need for the help desk to get involved in the vast majority of password related issues. IdentityNow allows users to manage passwords from any device – desktops, tablets, or smartphone – from any network.
Existing password management solutions generally only support a part of your application environment. But to achieve the full cost savings and security benefit, you need a solution that goes beyond traditional on-premises applications to cover the growing number of cloud applications. IdentityNow provides an extensive library of pre-built connectors to automate password changes and resets across all your applications.
Password synchronization allows users to leverage the same password across multiple applications, but only have to change it once. IdentityNow can detect and intercept native password changes which are initiated outside of the system and then automatically synchronize them with other applications that share a common password – across on-premises and cloud applications.
IdentityNow leverages a centralized governance framework to enforce consistent and secure password policies across all applications to ensure users are not putting the business at risk of a breach. It provides highly secure, pre-defined password policy defaults and best practices for password strength and complexity. Combined with the ability to expire and rotate passwords, IdentityNow can improve your security posture across your entire environment.
SecurityIQ enables organizations to centrally manage and control access to unstructured data, applying consistent administrative processes, policies and controls across systems running on- premises or in the cloud.
Data Discovery and Classification
In most organizations, sensitive information such as financial data, customer data, credit card information and personal health information can be found in hundreds of places – on file shares, on SharePoint sites, in cloud storage services and in email folders. SecurityIQ allows organizations to find and classify sensitive information, so they can put effective controls in place to manage and protect it.
Access to unstructured data can be difficult to visualize and impossible to manage and control without a complete understanding of how users are granted access. SecurityIQ automatically collects and analyzes effective permissions across on-premises Windows file servers, NAS devices, SharePoint and Exchange, as well as cloud-based portals, including Office 365, Box, Dropbox, Microsoft OneDrive and Google Drive
To prevent security breaches and information theft, or minimize the potential damage when something does occur, organizations need real-time tracking of users and their access to sensitive files, as well as the ability to respond to violations in real-time. SecurityIQ captures events for all users on monitored resources and enriches these events with user and machine details gathered from directories, IAM systems, HR applications and any other data source
SecurityIQ shares information with SailPoint IAM solutions to provide comprehensive governance of access to unstructured data. By augmenting IAM data from structured systems with permission data from unstructured data targets, your organization can more quickly identify risks, spot compliance issues and make the right decisions to strengthen controls.