Untitled Document

Identity & Access Management

What is it?

Internet Access Management (IAM) allows you to identify users, authenticate them and control their network access. Strict access control measures have to be used in order to protect the security of your network and the integrity of your data and systems.

Why you need it

IAM helps to reduce administrative costs and also remove security risks inherent with standard passwords. The ability for businesses to verify the identity of those attempting network access is essential for security and compliance considerations.

How it works

In order to gain access to the network, users have to supply their credentials or another method of identification. If an attempt is made to access your network without the correct authentication, access is denied.

Access privileges can be set for individual users or groups of users and this determines what network resources can be accessed.

Authentication and authorisation policies are managed from a central location and synchronisation polices ensure user repositories are up-to-date in each office location.

Single Sign-On (SSO) can form part of an IAM strategy where organisations use multiple disparate systems. SSO allows users to securely log into all of these systems by providing a single set of credentials.

Deepnet Unified Authentication is a multi-factor authentication platform for provisioning, managing and verifying users and disparate authentication methods.

Authentication methods that can be incorporated include Hardware tokens, software, Mobile phone, SMS tokens, USB tokens, keystroke dynamics, smartcard and biometrics.

DeepNet Unified Application Platform supports Windows and Linux operating systems and provides LDAP integration, centralised user management and web-based administration with a full audit trail.