Developers: | Dell |
Date of the premiere of the system: | 2013/10/23 |
Technology: | Cybersecurity - Antiviruses, cybersecurity - the Antispam, cybersecurity - Authentication, PAM Privileged Access Management, the Firewall, cybersecurity - Means of enciphering |
One Identity Cloud Access Manager - offers control functions by local or cloud applicaions using a web panel.
On October 23, 2013 the Dell company announced product output within the strategy of security of Connected Security. Innovation is created as the answer to calls in technology spheres: BYOD, cloud computing, network security and compliance to standards of security.
The vast majority of cracking of corporate information structures are made with participation (intended or unintentional) the staff of the company. The most effective method reduce risks of similar penetrations — implementing solutions for access control of users to information resources (IdAM – Identity and Access Management). By estimates of analysts, up to 96% of corporate cracking it would be possible to prevent in the presence of protozoa, or at least medium complexity, access control systems. A source - 2011 Data Breach Investigations Report, Verizon RISK Team with cooperation from the U.S.Secret Service and the Dutch High Tech Crime Unit.
The product family of Dell One Identity Management allows to solve problems of access control of users to corporate information resources. Implementation of Dell One Identity Management allows:
- increase transparency and controllability of the environment,
- reduce the risks connected with unauthorized access
- increase performance of users due to process automation of issue and change of access,
- enter the additional security levels (single authentication, multifactor authentication, etc.)
Description
The solution Dell One Identity Cloud Access Manager supports the new level of protection and gives to corporate users an opportunity of joint collecting and information analysis, acceptance of anticipatory measures for protection against threats of information security.
One Identity Cloud Access Manager promotes management of local or cloud applicaions by means of a web panel.
- Allows to manage access to local and cloud applicaions from different devices, including desktop PCs, notebooks and mobile devices.
- Offers the additional level of protection when using local and cloud applicaions, such as Salesforce, Google Apps and Office 365.
- Provides access using the web browser, using universal parameters of authentication. Provides timely selection of cloud resources, integration, authorization and audit.
On the other hand, no information security system will exist complete without audit of actions of users. For the solution of this task Dell Software offers ChangeAuditors+InTrust product line. Products of the ChangeAuditor family allow to book profound audit of applications on the Microsoft platform and also provide the additional level of protection of the most critical objects. The frame product InTrust allows to configure full-scale audit of all information systems of corporation. Solutions are exclusively simple in implementation and operation and allow to receive quickly results, starting with answers to the simplest questions ("Who? What made? When? With what?") and finishing correlation reports and notifications in real time.