Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/22/2012
05:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Aveksa Extends Business-Driven Identity And Access Management To The Cloud

Solution unifies the management of identities and access across internal and external environments

Waltham, Mass.--August 20, 2012--Aveksa, Inc., the leading provider of Business-Driven Identity and Access Management solutions, today announced that enterprises can now take a business-driven approach to Identity and Access Management for data and applications both inside the firewall as well as in cloud environments. Unlike competing approaches, Aveksa's solution unifies the management of identities and access across internal and external environments, without compromising visibility and control.

Organizations today are increasingly becoming hybrid, with critical applications and data frequently housed outside of the enterprise, and therefore not under direct control of IT or Information Security. While numerous technical tools exist that can help IT operations integrate and manage these cloud-based systems, Information Security teams have been struggling with how to bring these systems into their Identity and Access Management (IAM) programs. With the new Aveksa capabilities, organizations can now take a business-driven approach to IAM across the hybrid enterprise, and deploy business processes for lifecycle management and governance that extend from inside the firewall out to applications in the cloud.

The Aveksa platform's new capabilities, leveraging Aveksa's unique Security Integration Fabric&trade, enable both collection and change fulfillment for accounts, groups, profiles, roles and granular entitlements for cloud applications such as Salesforce, Google Apps, ServiceNow and NetSuite, and IaaS providers such as Amazon Web Services. The platform's ability to deliver automated lifecycle management for joiners, movers and leavers, and policy-based access compliance, now extends to a host of popular cloud applications and services. While Aveksa's new capabilities also include support for the emerging SCIM standard, they go far beyond SCIM in integrating with currently deployed cloud applications at the granular entitlement level.

With Aveksa's new IAM capabilities, business managers can now review user entitlements, request access changes and define business roles or business policies, while IT can automate business processes that respond to identity and access lifecycle events and manage access risk across all key cloud and on-premise applications. By doing so, the Aveksa platform serves as a system of record for who has access to what and how they got it, and becomes a critical asset for business efficiency and continuous compliance.

"Over the past year we have seen tremendous demand from our clients for a single Identity and Access Management solution for hybrid environments," said Art Poghosyan, Managing Director of Advancive Technology Solutions. "By using Aveksa's solution, we have been able to provide numerous clients with one management dashboard for all of their IAM processes, both on-premise and in the cloud, creating a true enterprise IAM solution."

Aveksa's business-driven approach to IAM enables the line of business to take ownership and become accountable for user access to applications and data that they are responsible for. The Aveksa platform, using its ControlXSTM architecture, does this by:

· Shifting Access Decision Responsibility to the Business--Aveksa's solutions enable the line of business to easily make access decisions, while remaining governed by Information Security-defined constraints.

· Providing a Centralized and Integrated Identity and Access Context at a Fine-Grained Level--Aveksa's solutions ensure that enterprises can view and control access at the level of fine-grained entitlements, compared to the account level that competing solutions provide.

· Enabling a Process-Driven Approach--Efficiently and consistently manage identity and access business processes across the entire infrastructure and the entire identity lifecycle.

· Leveraging Policy-Based Automation and Compliance--Automated enforcement of governance policies ensures continuous compliance, independent of the infrastructure.

"As enterprises move more and more applications and data to the cloud, it is imperative that access to those critical information resources have the same stringent controls and deep visibility as resources that reside behind the firewall," said Deepak Taneja, Founder and Chief Technology Officer, Aveksa. "Industry standards such as SCIM are a great start, but today's reality requires entitlement level access management for cloud applications so that users are provisioned and de-provisioned accurately and automatically, and compliance policies are continuously enforced."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23281
PUBLISHED: 2021-04-13
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to ro...
CVE-2021-27598
PUBLISHED: 2021-04-13
SAP NetWeaver AS JAVA (Customer Usage Provisioning Servlet), versions - 7.31, 7.40, 7.50, allows an attacker to read some statistical data like product version, traffic, timestamp etc. because of missing authorization check in the servlet.
CVE-2021-27600
PUBLISHED: 2021-04-13
SAP Manufacturing Execution (System Rules), versions - 15.1, 15.2, 15.3, 15.4, allows an authorized attacker to embed malicious code into HTTP parameter and send it to the server because SAP Manufacturing Execution (System Rules) tab does not sufficiently encode some parameters, resulting in Stored ...
CVE-2021-27601
PUBLISHED: 2021-04-13
SAP NetWeaver AS Java (Applications based on HTMLB for Java) allows a basic-level authorized attacker to store a malicious file on the server. When a victim tries to open this file, it results in a Cross-Site Scripting (XSS) vulnerability and the attacker can read and modify data. However, the attac...
CVE-2021-27602
PUBLISHED: 2021-04-13
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the sour...