Sailpoint Detail

[mk_page_section bg_image=”” attachment=”fixed” bg_position=”center center” bg_repeat=”no-repeat” bg_stretch=”true” enable_3d=”true” video_color_mask=”#000000″ full_width=”true” padding_top=”140″ padding_bottom=”180″ sidebar=”sidebar-1″][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_column_text disable_pattern=”false”]Product & Service[/vc_column_text][mk_fancy_title color=”#30a0e7″ size=”65″ font_family=”none”]True Happiness[/mk_fancy_title][vc_column_text]

“We want you to know that we care about our valued customers,
so that we are here to serve you with our reliable services as well
as our wide selection of products. We are currently holding the partnership
of Intel Security, Cyber-Ark, SailPoint, Tufin, Infoblox, Aruba,Tripwire, Fortinet, and
Forcepoint. We also provide all services that are related to these
product implementations, from implementation,
maintenance, and support services.”

Aplikas Servis Pesona offers world-class products among others:

[/vc_column_text][/vc_column][/mk_page_section][vc_row][vc_column][mk_padding_divider][mk_image src=”” image_size=”medium” align=”center”][mk_fancy_title size=”30″ letter_spacing=”1″ margin_top=”20″ font_family=”none” align=”center”]Product Sailpoint[/mk_fancy_title][/vc_column][/vc_row][vc_row][vc_column][vc_tta_pageable no_fill_content_area=”1″ active_section=”1″ pagination_style=”flat-square” pagination_color=”juicy-pink” tab_position=”top”][vc_tta_section title=”IdentityIQ” tab_id=”1489033613140-e7529589-d9fb”][mk_fancy_title font_family=”none” align=”center”]IdentityIQ[/mk_fancy_title][vc_column_text]

SailPoint IdentityIQ  is a complete governance- based identity and access management solution that provides fast, convenient application access that keeps business users productive, and access controls that keep the business safe.

[/vc_column_text][mk_fancy_title size=”20″ font_family=”none”]IdentityIQ Benefits:[/mk_fancy_title][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]

  • Manage compliance using automated access certifications and policy management
  • Empower users to request access and reset passwords independently
  • Automate provisioning across the user lifecycle by simplifying processes for creating, modifying and revoking access
  • Enable secure, yet convenient access to any application, from any device

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

  • Provide on-demand visibility into “who has access to what” to help make business decisions and meet audit requirements
  • Enable users to easily sign-on to web and SaaS applications without having to remember multiple passwords
  • Gain more visibility into all user access from the datacenter to the cloud and proactively enforce risk- appropriate governance controls

[/vc_column_text][/vc_column_inner][/vc_row_inner][mk_fancy_title size=”20″ font_family=”none”]IdentityIQ Features[/mk_fancy_title][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Access Certifications[/mk_fancy_title][vc_column_text]

IdentityIQ provides a fully automated, repeatable certification process and tracks and reports on the status of certifications by individual, application and organizational groups. IdentityIQ automates all        access certification task including formatting of user role and entitlement data into easy-to-read, business- oriented reports; routing of reports to the appropriate reviewers; tracking reviewer progress and actions; and archiving certification reports and data[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Policy Management[/mk_fancy_title][vc_column_text]IdentityIQ makes it easy for business and IT managers to define access policy across roles and entitlements using point-and-click  interfaces. IdentityIQ validates users’ existing access privileges against a wide variety of policy types, including entitlement and role separation-of-duty (SoD) policies, application/account-based policies, activity policies and risk-based policies.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Audit Reporting[/mk_fancy_title][vc_column_text]IdentityIQ enables compliance administrators, auditors and business managers to get the information they need on-demand from reports and personalized dashboards with data presented in a simple to use, business-friendly format. IdentityIQ also provides advanced analytics that allow for direct, customized queries, along with integration to third-party reporting and GRC tools[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Self-Service Access Request[/mk_fancy_title][vc_column_text]IdentityIQ provides a user-friendly solution for managing access requests. Users are guided to the right access through the IdentityIQ Request Advisor, which leverages Google-like keyword search and affinity-based search options that locate privileges based on what other business users have. Once users have selected access to request, they can review their shopping cart and check out using an intuitive e-commerce interface.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Password Management[/mk_fancy_title][vc_column_text]Users can self-manage passwords from its business-friendly interface, greatly reducing calls to the help desk and IT support. End users can automatically change passwords across multiple systems or recover forgotten passwords by correctly answering challenge/response questions, and managers and administrators can reset end user passwords[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Role Model[/mk_fancy_title][vc_column_text]By allowing organizations to request, approve, define policy and certify access using business roles rather than low-level technical entitlements, the IdentityIQ Role Model reduces complexity and simplifies user adminis- tration while enforcing “least privileged” access. With a combination of top-down, business-oriented role mining and bottom-up  IT role mining, business and technical users can quickly create roles that accurately reflect the organization’s  business and IT requirements.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Risk Model[/mk_fancy_title][vc_column_text]The Risk Model locates and identifies areas of risk created by users with inappropriate or excessive access privileges. It provides a dynamic risk model, for both users and applications, which leverages patent-pending risk algorithms to calculate and assign a unique identity risk score for each user, application and system resource. The risk score is updated continuously based on changes to the user’s access privileges, as well as “compensating factors,” such as how recently the user has been certified and whether a policy violation has been allowed as an exception. By leveraging risk scores, managers and application owners can target the highest-risk users or systems first, improving the effectiveness of controls for their departments and, ultimately, the security and compliance of the business[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Connectivity Foundation[/mk_fancy_title][vc_column_text]IdentityIQ provides a flexible Connectivity Foundation with pre-built integration to over 80 cloud and on-premises resources, along with integration options for other provisioning vehicles, such as third-party provisioning tools, service desk systems, and even manual provisioning processes. IdentityIQ seamlessly orchestrates how changes get fulfilled across multiple fulfillment mechanisms, giving organizations maximum flexibility to provision changes in whatever way they choose.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section title=”IdentityNow” tab_id=”1489033613182-ae563634-b76d”][mk_fancy_title font_family=”none”]

IdentityNOW[/mk_fancy_title][vc_column_text]Provides users with enterprise-grade identity governance capabilities that are always available, always up-to-date and accessible from any device, at any time. And since it’s delivered from the cloud, it can be up and running quickly with no additional hardware or software to buy, deploy and maintain.[/vc_column_text][mk_fancy_title font_family=”none”]Identity Now Benefits:[/mk_fancy_title][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]

  • Reduce operational costs and unburden the help desk by reducing calls related to password reset and account unlocks
  • Increase employee productivity by getting them back to work faste
  • Unify password management across on-premises, cloud, and mobile applications
  • Allow password reset from any device, on any network

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

  • Increase security by consistently enforcing strong password policie
  • Deliver a quick ROI with a SaaS delivery model that simplifies deployment and lowers support and maintenance costs
  • Replace legacy password management solutions that can’t support today’s cloud and mobile needs

[/vc_column_text][/vc_column_inner][/vc_row_inner][mk_fancy_title font_family=”none”]IdentityNow Features[/mk_fancy_title][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Intuitive self-service password reset[/mk_fancy_title][vc_column_text]By delivering user-friendly options to change existing passwords or recovering forgotten ones, you can eliminate the need for the help desk to get involved in the vast majority of password related issues. IdentityNow allows users to manage passwords from any device – desktops, tablets, or smartphone – from any network.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Broad support for both on-premises and cloud applications[/mk_fancy_title][vc_column_text]Existing password management solutions generally only support a part of your application environment. But to achieve the full cost savings and security benefit, you need a solution that goes beyond traditional on-premises applications to cover the growing number of cloud applications. IdentityNow provides an extensive library of pre-built connectors to automate password changes and resets across all your applications.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Automated password intercept and synchronization[/mk_fancy_title][vc_column_text]Password synchronization allows users to leverage the same password across multiple applications, but only have to change it once. IdentityNow can detect and intercept native password changes which are initiated outside of the system and then automatically synchronize them with other applications that share a common password – across on-premises and cloud applications.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Centralized administration and enforcement of password policy[/mk_fancy_title][vc_column_text]IdentityNow leverages a centralized governance framework to enforce consistent and secure password policies across all applications to ensure users are not putting the business at risk of a breach. It provides highly secure, pre-defined password policy defaults and best practices for password strength and complexity. Combined with the ability to expire and rotate passwords, IdentityNow can improve your security posture across your entire environment.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section title=”SecurityIQ” tab_id=”1489040447589-74427f07-712c”][mk_fancy_title font_family=”none”]SecurityIQ[/mk_fancy_title][vc_row_inner][vc_column_inner][vc_column_text]SecurityIQ enables organizations to centrally manage and control access to unstructured data, applying consistent administrative processes, policies and controls across systems running on- premises or in the cloud.

[/vc_column_text][mk_fancy_title font_family=”none”]Security IQ Benefits[/mk_fancy_title][vc_column_text]

  • SecurityIQ improves data security posture by allowing relevant data owners to control user access and usage via an intuitive dashboard.
  • SecurityIQ minimizes risk exposure to data leakage or breach by discovering and monitoring access to files containing sensitive data, such as PII, PHI and PCI.
  • SecurityIQ unifies identity and data governance policies by centrally managing access to all files stores on-premises and in the cloud

[/vc_column_text][mk_fancy_title font_family=”none”]Security IQ Features[/mk_fancy_title][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]

Data Discovery and Classification[/mk_fancy_title][vc_column_text]In most organizations, sensitive information such as financial data, customer data, credit card information and personal health information can be found in hundreds of places – on file shares, on SharePoint sites, in cloud storage services and in email folders. SecurityIQ allows organizations to find and classify sensitive information, so they can put effective controls in place to manage and protect it.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Permissions Management

[/mk_fancy_title][vc_column_text]Access to unstructured data can be difficult to visualize and impossible to manage and control without a complete understanding of how users are granted access. SecurityIQ automatically collects and analyzes effective permissions across on-premises Windows file servers, NAS devices, SharePoint and Exchange, as well as cloud-based portals, including Office 365, Box, Dropbox, Microsoft OneDrive and Google Drive[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Data Activity Tracking[/mk_fancy_title][vc_column_text]To prevent security breaches and information theft, or minimize the potential damage when something does occur, organizations need real-time tracking of users and their access to sensitive files, as well as the ability to respond to violations in real-time. SecurityIQ captures events for all users on monitored resources and enriches these events with user and machine details gathered from  directories, IAM systems, HR applications and any other data source[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][mk_fancy_title font_family=”none”]Complete Coverage[/mk_fancy_title][vc_column_text]SecurityIQ shares information with SailPoint IAM solutions to provide comprehensive governance of access to unstructured data. By augmenting IAM data from  structured systems with permission data from unstructured data targets, your organization can more quickly identify risks, spot compliance issues and make the right decisions to strengthen controls.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][/vc_tta_pageable][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row]