Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
NEW YORK, NY -- (Marketwired) -- 05/08/13 -- Identropy, a leading Identity-as-a-Service (IDaaS) provider, today announced the launch of its new SaaS Advisory service offering. The new offering is designed to enable organizations to ensure that all SaaS applications are within the purview of IT, properly risk-assessed, and integrated into the organization's Identity and Access Management (IAM) Governance processes.
"The rapid adoption of SaaS apps has given rise to the 'Shadow IT' problem -- when individuals or business units provision Cloud applications without regard to corporate IT procurement and governance processes," said Aldo Pietropaolo, Director of Professional Services for Identropy. "Because IT organizations can't control their Cloud providers' IT risk posture, it's essential that all Cloud-based applications in use in the organization are integrated into existing IAM Governance processes. We've received so much demand for help with this that we launched a dedicated SaaS Advisory service to ensure organizations are positioned to maximize their investment in both IAM and SaaS."
Identropy uses a three part framework: Inventory - Assess - Formulate, to provide an action plan for managing access to Cloud applications without degrading the business benefits that they offer:
Inventory: The first order of business is to get an inventory of the SaaS applications currently in use in a company. Identropy uses a combination of technology tools and interviews with key stakeholders to obtain an accurate inventory of current and future Cloud /SaaS applications. Once that process is complete, the inventoried applications are vetted against Identropy's database of more than 500 SaaS applications, taking into account what types of data those applications manage and the IAM standards to which they adhere.
Assess: After the inventory process is completed, the next step is to compare the organization's portfolio of SaaS applications against existing enterprise IAM capabilities to identify synergies and gaps. Analysis vectors include Authentication, Federation, Authorization, Provisioning, Entitlement Modeling, Recertification, and Reporting and Audit.
Formulate: Based on the assessment outcomes, Identropy will formulate a set of recommended strategies and tactics for proper integration with existing IAM efforts. These are targeted at addressing the current identified SaaS applications within the enterprise, but also at providing an ongoing framework to capture new SaaS applications as they begin to get used within the enterprise.
More on Identropy's SaaS Advisory offering can be found here.
Pricing and Availability:
Identropy consultants are available for SaaS Advisory engagements effective immediately. The offering is delivered as a fixed-price engagement for $15,000.
About Identropy
Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their Identity and Access Management (IAM) initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Identropy's innovative Secure Cloud-based Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visit www.identropy.com.
Media Contact:
Elizabeth Safran
Looking Glass Public Relations
Email Contact
408-348-1214
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs