Strategy + Positioning
In order to introduce an identity and access management solution successfully, the objectives should be clearly defined and the scope of the project outlined up front. Discontinued projects or that a company does not even attempt to take on the challenge of such a project in the first place...
Find out more
Identity Management
Identity and access management links processes, technologies and guidelines to manage digital identities and defines how these are used to access resources. Projects from this area tend to be more complex than most...
Find out more
Authentication
Authentication plays a major role in daily business processes. Business applications and their processes must be easy to use and the access to them must be secure. When designing and implementing, IT departments are...
Find out more
Authorisation
More and more companies are able to ensure end-to-end information protection. On the one hand there is the specialist department conducting its business, creating data that it then has to process...
Find out more
Cloud Services
IT infrastructures and business requirements are changing in today's world with tremendous speed and diversity. From our expirience the most challenging topics are the service publishings...
Find out more