You are on page 1of 2

Identity & Access Governance

WALLIX IAG

Simplify access rights governance


without compromising productivity,
and while improving compliance!
Technical
Identity and Access Governance (IAG) enables the implementation Specifications
of security policies for managing the rights assigned to employees
and contractors, ensuring their legitimacy. Users should only access
> Operational Analysis
IT system resources essential for their business requirements and in
of PSSI Compliance
accordance with their role-based rights.
Get your first analyses,
WALLIX IAG enables you to map and control access rights daily, a global compliance
dashboard and quick-to-build
aligning closely to your employees' movements. It helps you save
customized reports.
time through high-performance management of your business
teams' rights, with a collaborative vision and "automated" execution
> Mapping IT System
of review campaigns. Access Rights

With WALLIX IAG, regaining control over your access rights has Quickly answer the question
never been quicker or easier! "Who is entitled to what" on your IT
system, and use native WALLIX IAG
reports for auditing and controlling
MODELIZATION
• Data consolidation (Directories, Cloud, Files authorizations, rights reviews and
system, applications...) via our ETL. monitoring changes.
• Design of access and rights attribution models,
adapted to the specific features of the informa-
tion system and to your needs. > Management of Rights
Review Campaigns
ANALYSIS
MODELIZATION ANALYSIS • Centralized view of all access rights across the Benefit from efficient recertification
entire IT system, via a web interface. management thanks to a web
• Quick search.
interface and automated alerts.
IAG COMPLIANCE
• Detection of anomalies in your IT system secu- > Monitoring Arrivals
rity policy. / Mobility & Departures
COMPLIANCE REVIEWS • Identification of toxic combinations.
• Audit of technical accounts.
• Customized indicators and dashboards. Reduce risk by recertifying employee
entitlements as close as possible to
REVIEWS the point of mobility.
• Rights and transfer tracking reviews.
• Advanced campaign configuration (duration,
periodicity, targeted resources and populations, > Management of Requests
campaign administrators and approvers, etc.) (Remediation)
• Remediation workflow.

Initialize request workflows,


communicate with your ITSM.
Benefits
Features

Access Identification Lifecycle Management


• A centralized view of access to • Ensuring consistency and OPERATIONAL
the internal IT system and validation of authorizations EFFICIENCY
applications, regardless of through management processes • Time savings for reviewers and
data heterogeneity, on site or and business line managers. auditors.
in the cloud. • Shared indicators and monitoring,
• Validation of the accelerated decision-making.
• A complete overview of internal appropriateness of rights
• Native evolution with WALLIX PAM
and external employee granted based on employee
authorizations. and service provider business
roles.
• An exhaustive mapping of
privileged accounts. • Continuous access control for
new arrivals, transfers, and
departures. ENHANCED SECURITY

Risk Control Audit Facilitation and • Upstream risk detection,


Compliance Assurance compliance with corporate
• Detection of orphan accounts
or accounts with security policies.
• Auditability of privileged
over-allocated rights. • Remediation plans and
accounts.
continuous improvement.
• Application of the Separation • Secure Cloud strategy by
• Reports tailored to auditors and
of Duties (SoD) principle. statutory auditors. detecting excessive permissions.

• Identification of toxic • Support for regulatory


combinations of rights. compliance (ISO 27001, SOX, LSF,
Basel III, NIS2, PCI DSS, Solvency
• Implementation of a corrective II, DORA...)
plan using third-party solutions
CONTROLLED DIGITAL
(WALLIX PAM, ITSM, IAM...)
TRANSFORMATION

• Innovation becomes more fluid,


by sharing information and data

About WALLIX while controlling access rights.


• Possibility of developping new
WALLIX is the European specialist in access and identity management security and is a global
digital uses in complete security.
leader in Privileged Access Management. WALLIX's technologies enable companies to meet
the challenges of network security and identity and access management. They facilitate • Allows organizations to focus on
detection, promote resilience against cyberattacks, protect organizations' digital assets, and their business challenges.
ensure uninterrupted business operations across IT systems, including the cloud and industrial
networks. The addition of the WALLIX IAG solution seamlessly complemented their existing
portfolio following the acquisition of Kleverware. Furthermore, all WALLIX solutions are designed
to support regulatory compliance..

WWW.WALLIX.COM

You might also like