eTelligent cybersecurity services span program security engineering, testing, risk management, defect resolutions, compliance, and change request support. We integrate cybersecurity into our development processes to continuously identify, manage, and address security risks and vulnerabilities.
Identity Management involves defining what users can do on the network with specific devices and under what circumstances. Today, many security products have an added emphasis on managing mobile access to corporate systems. In an enterprise setting, identity management is used to increase security and productivity, while decreasing cost and redundant effort. eTelligent has implemented many industry leading COTS products to deliver a scalable ID Management strategy across diverse IT platforms.
For security reasons, tools for managing identity management should run as an application on a dedicated network appliance or server, either on-premises or in the cloud. At the core of an identity management system are policies defining which devices and users are allowed on the network and what a user can accomplish, depending on his device type, location and other factors. All of this also depends on appropriate management console functionality, including policy definition, reporting, alerts, alarms and other common management and operations requirements.
An alarm might be triggered, for example, when a specific user tries to access a resource for which they do not have permission. Reporting produces an audit log documenting what specific activities were initiated. eTelligent has dedicated subject matter experts on products such as Sailpoint, Oracle Identity and Access Management (IAM), Okta, and CA Identity Manager.