Waltham, Mass.--August 20, 2012--Aveksa, Inc., the leading provider of Business-Driven Identity and Access Management solutions, today announced that enterprises can now take a business-driven approach to Identity and Access Management for data and applications both inside the firewall as well as in cloud environments. Unlike competing approaches, Aveksa's solution unifies the management of identities and access across internal and external environments, without compromising visibility and control.
Organizations today are increasingly becoming hybrid, with critical applications and data frequently housed outside of the enterprise, and therefore not under direct control of IT or Information Security. While numerous technical tools exist that can help IT operations integrate and manage these cloud-based systems, Information Security teams have been struggling with how to bring these systems into their Identity and Access Management (IAM) programs. With the new Aveksa capabilities, organizations can now take a business-driven approach to IAM across the hybrid enterprise, and deploy business processes for lifecycle management and governance that extend from inside the firewall out to applications in the cloud.
The Aveksa platform's new capabilities, leveraging Aveksa's unique Security Integration Fabric&trade, enable both collection and change fulfillment for accounts, groups, profiles, roles and granular entitlements for cloud applications such as Salesforce, Google Apps, ServiceNow and NetSuite, and IaaS providers such as Amazon Web Services. The platform's ability to deliver automated lifecycle management for joiners, movers and leavers, and policy-based access compliance, now extends to a host of popular cloud applications and services. While Aveksa's new capabilities also include support for the emerging SCIM standard, they go far beyond SCIM in integrating with currently deployed cloud applications at the granular entitlement level.
With Aveksa's new IAM capabilities, business managers can now review user entitlements, request access changes and define business roles or business policies, while IT can automate business processes that respond to identity and access lifecycle events and manage access risk across all key cloud and on-premise applications. By doing so, the Aveksa platform serves as a system of record for who has access to what and how they got it, and becomes a critical asset for business efficiency and continuous compliance.
"Over the past year we have seen tremendous demand from our clients for a single Identity and Access Management solution for hybrid environments," said Art Poghosyan, Managing Director of Advancive Technology Solutions. "By using Aveksa's solution, we have been able to provide numerous clients with one management dashboard for all of their IAM processes, both on-premise and in the cloud, creating a true enterprise IAM solution."
Aveksa's business-driven approach to IAM enables the line of business to take ownership and become accountable for user access to applications and data that they are responsible for. The Aveksa platform, using its ControlXSTM architecture, does this by:
· Shifting Access Decision Responsibility to the Business--Aveksa's solutions enable the line of business to easily make access decisions, while remaining governed by Information Security-defined constraints.
· Providing a Centralized and Integrated Identity and Access Context at a Fine-Grained Level--Aveksa's solutions ensure that enterprises can view and control access at the level of fine-grained entitlements, compared to the account level that competing solutions provide.
· Enabling a Process-Driven Approach--Efficiently and consistently manage identity and access business processes across the entire infrastructure and the entire identity lifecycle.
· Leveraging Policy-Based Automation and Compliance--Automated enforcement of governance policies ensures continuous compliance, independent of the infrastructure.
"As enterprises move more and more applications and data to the cloud, it is imperative that access to those critical information resources have the same stringent controls and deep visibility as resources that reside behind the firewall," said Deepak Taneja, Founder and Chief Technology Officer, Aveksa. "Industry standards such as SCIM are a great start, but today's reality requires entitlement level access management for cloud applications so that users are provisioned and de-provisioned accurately and automatically, and compliance policies are continuously enforced."