Managing employee access and authorization in an organization
Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future. Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. AC Identity will help you avoid these problems.
In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved. Wouldn’t it be better to control identities automatically and centrally from one place? AC Identity is the solution that will enable you to do this!
AC Identity - Identity Management System (IDM) by AUTOCONT, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.
Mrs Smith starts a new job today as an assistant in the sales department. When it comes to new employees, many companies use printed check lists where Mrs Smith’s subordinate checks what systems and with what permissions Mrs Smith should have access to. The request then goes to the IT department. What software tools will you use to give her access to everything she is going to work with?
Access to the organization – creating an employee card (adding it into the card system), getting access to the “computer” (adding it to the directory service), setting up an e-mail account and intranet portal access (adding her to the intranet portal and setting appropriate permissions), setting up CRM access (adding her to CRM and setting appropriate permissions), setting up access to work reporting system (adding her to the attendance system and setting appropriate permissions), setting up access to relevant folders and documents in the organization (setting file and management system permissions), adding her into the payroll system. Quite a lot of things, right?
Mrs. Smith unfortunately did not prove her abilities and is dismissed in her trial period. How easily, quickly and reliably will you be able to deactivate all of her access rights? Can it happen that she will still be able to enter the systems remotely after the termination of her contract?
WHAT IS HAPPENING IN THE ORGANIZATION | WITH AC IDENTITY | WITHOUT AC IDENTITY |
Time to change/reset the password | In seconds | In hours |
Duration of execution of changes within the organizational structure | In hours | In weeks |
IT operations related to permission administration | Cost reduction by 10 to 30% | - |
Helpdesk/call centre operations | Cost reduction by 10 to 30% | - |
Employee downtime while waiting for necessary permissions | Cost reduction by 2 to 10% | - |
Preparation of documents for security audit | Cost reduction by 60 to 90% | - |
Costs associated with security threats | Savings can be clearly quantified after evaluating assets, security risks and threats when performing a security analysis. | - |
Costs associated with unused account and license fees | Savings are associated with licensing of 1 user in the organization (e.g. CZK 750 = for 40 unconfirmed users CZK 30,000). | - |
Implementation of the AC Identity management system, including integration with SAP, Active Directory, MS Exchange, SharePoint company portal, including implemented applications (e.g. contract module).
AC Identity effectively controls the identity life cycle in Agrotec and its subsidiaries. Besides that, AC Identity primarily controls user permissions on the Intranet and SharePoint contract module.
Implementation of the AC Identity management system for Regional Authority’s administration of its internal identities and the administration of the external identities established by the organization.
The implementation included integration with the key systems of the organization such as the HR system, records management, corporate directory, e-mail, integration platform, and platform for communication with national registers.
AC Identity manages centrally and automatically permissions for 24 systems of the region.