Image
Image
go:Identity - The IAG Appliance
Automated. Standardized. Rapidly Operational. Sustainable.
go:Identity is the preconfigured and extremely quickly deployable identity management software for user administration and administration of access rights.

With standards and best practice functions,go:Identity finally enables Identity Management and Access Management (IAM / IAG) for companies of all sizes.

Quickly implemented, with automated user, access and role management, go:Identity helps increase security and reduce costs in the company. Compliance requirements are guaranteed as well as user friendliness.

We implement a typical IDM project with MS Active Directory® and synchronization with an HR data source with an external effort of only 10 days (more information on this below).

Together with the optional go:Identity Secure Access Module, go:Identity forms a comprehensive Identity Management and Access Management solution.

Resources:

Click here for a quick video about go:Identity:

More Information? Schedule a Webcast for go:Identity

Please tell us your e-mail address and your name. We will then contact you to agree on a demo webcast appointment.

Please enter name
Please enter email address Email address not valid

Why use a preconfigured solution like go:Identity?

Tight IT budgets often hinder organizations from implementing necessary Identity and Access Management solutions. This is especially true for small and midsized companies. In addition, we provide decades of best practice experience in our software, out of the box.

How can standard use cases be automated cost-effective?

go:Identity is up and running faster than more traditional Identity & Access Management solutions with the same use cases. By using our decades of experience deploying other solutions, we are able to include best practices out of the box and deliver functionality that typically takes several weeks or months to configure. This includes functionality like: user provisioning and de-provisioning, Role-based permissions, user self-service and approval workflow to name just some of the key processes that are included out of the box.

Benefits of the go:Identity Appliance approach

Projects with conventional IDM solutions

Project duration
  • Component selection
  • Process analysis
  • IDM best-practice definitions
  • Design of basic processes
  • Development
  • Software QS
  • Training

- High implementation cost

- Long project cycles

- Less to none standardisation

 

go:Identity projects

Project duration
  • Implementaion and Customizing
  • Use Cases Tests
  • Introduction / Training

+ prompt implementation

+ proven processes

+ secure standards

+ compliance without effort

Minimal project risk with
go:Identity

The "out-of-the-box" approach significantly reduces the project risk in our projects, because the built-in "best practice" means that the processes and functions no longer have to prove their suitability.

Instead of long-running projects with fuzzy, slow results, with go:Identity you will immediately see the almost finished system, which only needs to be configured instead of programmed.

A typical project example

IDM projects are not rocket science and do not have to be as complex as it is often portrayed.

go:Identity offers "out-of-the-box" exactly those functions which are important in identity management and which have already proven themselves hundreds of times in practice.

A full IDM project with e.g.

  • with Active Directory® as the target system and
  • connection of HR data source

we already realize together with our customers with an external effort of

only 10 days

from the first requirements workshop to go-live.

Stay flexible with
go:Identity

The approach is important

Think in phases and start in a 1st phase with goals that quickly bring the greatest benefit, e.g. in the form of reduced effort and increased security.

In further phases, extensions can be added:

  • other target systems (e.g. SAP, Office365, etc.)

  • further automation other scenarios such as access management

  • customer-specific extensions of all kinds

  • and much more.

You can always be sure that go:Identity is prepared for future requirements.

Let us explain to you in a personal webcast
how easy Identity Management is with go:Identity

Please tell us your e-mail address and your name. We will then contact you to agree on a demo webcast appointment.

Please enter name
Please enter email address Email address not valid

Typical Use Cases for Identity Management

Image

Challenge:
Does High risk = high cost?

A distribution system operator had to provide secure access to highly protected systems in a decoupled infrastructure. Managing accounts and maintaining access was error-prone and cumbersome.

Image

Solution:
Automation Reduces Risk and Cost

go:Identity automated account and entitlement management by standardizing the processes. Transparency and high efficiency reduced an imminent security risk significantly.

Image

Challenge:
Administration of access to fileshares

The administration of access to fileshares was time-consuming and insecure, because no comprehensible approvals from business responsible were possible, there was no self-service for requests for access and it was not ensured that unneeded authorizations would also be withdrawn. In addition, the manual effort in IT was immense.
Image

Solution:
Automation, Self-Service and Approval Processes

With go:Identity, access to fileshares is now granted automatically based on the employee's tasks. Additional access can be requested by people in the go:Identity IT-Shop, approved by the responsible person and assigned without manual work from IT. Authorizations that are not required are now automatically withdrawn, or those responsible can now regularly check and correct them.

Image

Challenge:
Azure AD was excluded

An electronic parts manufacturer struggled to integrate Azure AD into centrally managed business processes for accounts and permissions.

Image

Solution:
Add cloud to On-Prem

go:Identity established a secure bridge to maintain all connections and account entitlement data with real-time synchronization and data consistency. Azure AD is now integrated from a cloud location.

Image

Challenge:
Failed Compliance Audit

A financial institution failed a compliance audit facing stiff financial penalties. They found their employee Access Management was out of compliance. In order to avoid this issue in the future, they required an automated management solution for employee lifecycle reporting and attestation.

Image

Solution:
Compliance Achieved Rapidly!

go:Identity consolidated all business application entitlements, including attestation and reporting, into a centrally managed interface and successfully mitigated the issues that caused their compliance failure.

Technical components and added value from go:Identity

Functional Benefits

  • Join / Move/ Leave of Identities

  • Self-Service / Helpdesk

  • Request and Approval of Entitlements

  • Password Management

  • Attestation

  • Audit and Compliance

Technological Benefits

  • Ready-made appliance in a virtual or physical machine

  • Pre-configured software – no lengthy installation

  • Project-proven workflows and approval processesInstantly ready out of the box – configuration is Possible

  • Integration, go-live and operation on-Prem or hosted

  • Multi language (DE, EN, FR – additional languages on demand)

Connectivity

  • Connection to standard systems, e.g. Microsoft Active Directory, MS Exchange, Notes, LDAP

  • SaaS Systems, e.g. Microsoft Azure AD and Office 365, Salesforce, Workday, etc.

  • Business applications, e.g. SAP, Oracle, etc.

  • Databases: Oracle, MSSQL, MySQL, PostgreSQL etc.

  • Unix and Linux

  • Many other connectors

  • Custom integrations are simplified with a flexible connector framework

More details about the functionalities of go:Identity are available here under "Functions in detail".

Typical go:Identity Landscape

Easy Access

Users and administrators simply work via a standard web browser go:Identity.

Ready-to-use Integrations

Ready-made integration modules, so-called IDM Connectors, exist for a large number of system types.

Easy Implementation

The prepared appliance is implemented in your environment in no time at all.

Image

Other products from COGNITUM Software

Managing Roles with go:Roles

go:Roles

The comprehensive tool for entering, designing, controlling and maintaining business role models in Access Management - can be operated independently of the IAM system used.

Cognitum

Cognitum

The development platform for quick and easy creation of standardized and highly secure JAVA-based web applications.