Identity and Access Management (IAM)
TABLE OF CONTENTS
Identity and Access Management (IAM) provides employees safe access to all the systems they need.
What is IAM?
Privileged Access Management (PAM) is a way of providing various employees more rights and different types of access. External employees, for example, require different (temporary) rights than internal staff. In Topicus KeyHub, more rights and access is provided according to Just-in-Time provisioning. Topicus KeyHub hereby offers all the possible IAM solutions in one.
Employees belong to a group and are therefore given access to the systems that they minimally require for their work. The access is user-friendly and safe with Multi-Factor Authentication (MFA). Employees and team leaders know best which systems they require for their work. With KeyHub, it is possible to temporarily assign more rights to responsible users.
"You won't start to see it until you understand it."
Request a FREE Demo and discover the power of KeyHub.IAM and PAM
Privileged Access Management (PAM) is a way of providing various employees more rights and different types of access. External employees, for example, require different (temporary) rights than internal staff. In Topicus KeyHub, more rights and access is provided according to Just-in-Time provisioning. Topicus KeyHub hereby offers all the possible IAM solutions in one.
Employees belong to a group and are therefore given access to the systems that they minimally require for their work. The access is user-friendly and safe with Multi-Factor Authentication (MFA). Employees and team leaders know best which systems they require for their work. With KeyHub, it is possible to temporarily assign more rights to responsible users.
Access governance
Access governance consists of rules, protocols and services that combats the unnecessary provision of access and enforces appropriate access to digital systems and sensitive information. Topicus KeyHub was built on two principles that support this. On the one hand, you have the principle of Least Privilege, in which users are provided with the minimum number of rights in order to do their work.
IAM and ease of use
Employees come and go at organisations. In Topicus Keyhub, providing and revoking access rights for employees is quickly and easily arranged. Employees are invited by their team leader or they request access to the systems on their own. Without the intervention of a system administrator, teams can determine who gets what kind of access.
Team leaders can thereby arrange the on-boarding and off-boarding of employees faster, easier and safer. Employee login to Topicus KeyHub with Two-Factor Authentication (2FA), after which the user is given automatic access to the other systems with Single Sign-On (SSO).
IAM with transparency
For the employees in the teams, it is perfectly clear who has access to what. Topicus KeyHub provides insight into which employee is authorised for what. An Audit trial automatically keeps track of who has access to what and at which times.
This keeps employees alert to any possible security breaches. In addition, employees also receive relevant notifications if actions are required. For example, a notification for a team member when access to a group is requested.
IAM and compliance
To ensure compliance, IAM must comply with all the laws, regulations and standards. Topicus KeyHub helps ensure that you maximally comply with the most important standards that apply for digital security. It enables audits for such certifications as ISO 27001, NEN 7510, SOC 2 and the GDPR to be carried out quickly.
Topicus KeyHub offers one-touch insight into who has access with the Audit trail via the Auditor Dashboard. The authorisation matrix and audit trails can always be exported for further analysis. KeyHub hereby makes the information you need for a successful Audit automatically accessible.