Image
Image
go:Identity - The IAG Appliance
Automated. Standardized. Rapidly Operational. Sustainable.
go:Identity is the pre-configured and standardized Identity Management solution with automated user access and role management. The solution is quickly deployed, reducing overall costs, and adheres to all major regulatory standards with a user friendly interface.

Resources:

Click here for a quick video about go:Identity:

More Information? Schedule a Webcast for go:Identity

Please tell us your e-mail address and your name. We will then contact you to agree on a demo webcast appointment.

Please enter name
Please enter email address Email address not valid

Typical Use Cases for Identity Management

Image

Challenge:
Does High risk = high cost?

A distribution system operator had to provide secure access to highly protected systems in a decoupled infrastructure. Managing accounts and maintaining access was error-prone and cumbersome.

Image

Solution:
Automation Reduces Risk and Cost

go:Identity automated account and entitlement management by standardizing the processes. Transparency and high efficiency reduced an imminent security risk significantly.

Image

Challenge:
Administration of access to fileshares

The administration of access to fileshares was time-consuming and insecure, because no comprehensible approvals from business responsible were possible, there was no self-service for requests for access and it was not ensured that unneeded authorizations would also be withdrawn. In addition, the manual effort in IT was immense.
Image

Solution:
Automation, Self-Service and Approval Processes

With go:Identity, access to fileshares is now granted automatically based on the employee's tasks. Additional access can be requested by people in the go:Identity IT-Shop, approved by the responsible person and assigned without manual work from IT. Authorizations that are not required are now automatically withdrawn, or those responsible can now regularly check and correct them.

Image

Challenge:
Azure AD was excluded

An electronic parts manufacturer struggled to integrate Azure AD into centrally managed business processes for accounts and permissions.

Image

Solution:
Add cloud to On-Prem

go:Identity established a secure bridge to maintain all connections and account entitlement data with real-time synchronization and data consistency. Azure AD is now integrated from a cloud location.

Image

Challenge:
Failed Compliance Audit

A financial institution failed a compliance audit facing stiff financial penalties. They found their employee Access Management was out of compliance. In order to avoid this issue in the future, they required an automated management solution for employee lifecycle reporting and attestation.

Image

Solution:
Compliance Achieved Rapidly!

go:Identity consolidated all business application entitlements, including attestation and reporting, into a centrally managed interface and successfully mitigated the issues that caused their compliance failure.

Why use a preconfigured solution like go:Identity?

Tight IT budgets often hinder organizations from implementing necessary Identity and Access Management solutions. This is especially true for small and midsized companies. In addition, we provide decades of best practice experience in our software, out of the box.

How can standard use cases be automated cost-effective?

go:Identity is up and running faster than more traditional Identity & Access Management solutions with the same use cases. By using our decades of experience deploying other solutions, we are able to include best practices out of the box and deliver functionality that typically takes several weeks or months to configure. This includes functionality like: user provisioning and de-provisioning, Role-based permissions, user self-service and approval workflow to name just some of the key processes that are included out of the box.

Functional Benefits

  • Join / Move/ Leave of Identities

  • Self-Service / Helpdesk

  • Request and Approval of Entitlements

  • Password Management

  • Attestation

  • Audit and Compliance

Technological Benefits

  • Ready-made appliance in a virtual or physical machine

  • Pre-configured software – no lengthy installation

  • Project-proven workflows and approval processesInstantly ready out of the box – configuration is Possible

  • Integration, go-live and operation on-Prem or hosted

  • Multi language (DE, EN, FR – additional languages on demand)

Connectivity

  • Connection to standard systems, e.g. Microsoft Active Directory, MS Exchange, Notes, LDAP

  • SaaS Systems, e.g. Microsoft Azure AD and Office 365, Salesforce, Workday, etc.

  • Business applications, e.g. SAP, Oracle, etc.

  • Databases: Oracle, MSSQL, MySQL, PostgreSQL etc.

  • Unix and Linux

  • Many other connectors

  • Custom integrations are simplified with a flexible connector framework

Benefits of the go:Identity Appliance approach

Projects with conventional IDM solutions

Project duration
  • Component selection
  • Process analysis
  • IDM best-practice definitions
  • Design of basic processes
  • Development
  • Software QS
  • Training

- High implementation cost

- Long project cycles

- Less to none standardisation

 

go:Identity projects

Project duration
  • Implementaion and Customizing
  • Use Cases Tests
  • Introduction / Training

+ prompt implementation

+ proven processes

+ secure standards

+ compliance without effort

Typical go:Identity Landscape

Easy Access

Users and administrators simply work via a standard web browser go:Identity.

Ready-to-use Integrations

Ready-made integration modules, so-called IDM Connectors, exist for a large number of system types.

Easy Implementation

The prepared appliance is implemented in your environment in no time at all.

Image

Other products from COGNITUM Software

Managing Roles with go:Roles

go:Roles

The comprehensive tool for entering, designing, controlling and maintaining business role models in Access Management - can be operated independently of the IAM system used.

Cognitum

Cognitum

The development platform for quick and easy creation of standardized and highly secure JAVA-based web applications.