Internal security incidents can have serious implications for enterprises. Analysis shows that up to 71% of employees have unauthorized access to confidential company data. According to E & Y's 2012 Global Information Security Survey, employees are the most likely source for an attack on IT security, whether they are deliberate or the result of errors and negligence.
Failure to protect data and IT systems increases risks for reputation, audit failures, loss of intellectual property and confidential information, and many legal issues. To mitigate such risks, organizations need to define and implement IT access policies such as segregation of duties, least privilege, and role based access.
Morten Boel Sigurdsson - CEO, Omada says, "The problem arises because these policies are impossible to implement and enforce. Many organizations can't gain full control of their access data; as a result, they can't detect non-compliance with corporate policies and mitigate situations proactively. Many find it difficult to really 'get a grip' on the granted access rights across all their on premise and cloud applications."
The problem is multi-faceted and includes:
- Poor visibility into who has approved what (if approved at all)
- Inability to match policies with actual access granted in IT systems
- Meaningless rubber-stamping for re-certifications and approvals
- Ambiguous access rights that lack clear business descriptions
- Poor ownership overviews for applications and data
- Inability to seamlessly onboard new systems, applications, employees, contractors
These challenges all point to the same problem. Many organizations are not in full control of their IT environments when it comes to access control and experience an increased risk of a severe security breach.
Omada Identity Suite v11 is a direct response to these challenges. The new release introduces a governance dashboard that adds significant power and flexibility to existing dashboard capabilities. The governance dashboard offers organizations a consolidated view of all access data across applications, on premise and cloud-based. Just as important, the new functionality offers much more than an overview. All data is reconciled, and if inconsistencies are detected, they can be corrected with a single mouse click. This powerful feature is easy to use, reduces risk, and saves valuable time.
System owners, managers, and internal auditors work with a user interface experience that is relevant to their job role. This is possible due to the sophisticated reconciliation and policy engine (ROPE) that lies 'under the hood' in the product. The ROPE engine performs advanced calculations, ensuring that actual data across all applications are constantly analyzed and evaluated against policies such as access policies, SOD policies, and approvals.
In addition to the new interactive governance dashboard, Omada Identity Suite version 11 delivers a range of enhanced capabilities:
- An interactive survey designer enables easy guided creation and release of advanced, customized surveys
- Flexible attestation survey templates support easy to understand access certifications-no more rubber stamping
- A new reference architecture supports advanced reconciliation, and analysis of current state of entitlements
- Advanced policy creation and enforcement utilizing the Role & Policy Engine
- Enhanced IT resource lifecycle management for easy onboarding of business applications into a governance model
- SOD controls feature enhancements
- Improved continuous data quality reporting
- Windows Server 2012 R2 support
Omada Identity Suite version 11 is available today.
For further information or inquiries, please write to info@omada.net or visit www.omada.net.
About Omada Identity Suite
Omada Identity Suite is a leading enterprise solution for identity and access management, identity governance, and compliance in one integrated platform. Omada Identity Suite is uniquely able to provide identity access management and governance processes that dynamically and easily adapts to changes in the business. Customers can achieve very fast time-to-value as they can start with their immediate needs and expand the solution over time.