Image
Image

go:Identity - The IAG Appliance

Automated. Standardized. Rapidly Operational. Sustainable.

go:Identity is the preconfigured identity management software that can be deployed extremely quickly for user administration and administration of access rights.

With its standards and best practice functions, go:Identity finally enables Identity Management and Access Management (IAM - Identity Access Management) and Identity Access Governance (IAG) for companies of all sizes.

More than 50 out-of-the-box connectors for the connection to and integration of external target systems and databases exist and can be flexibly configured.

Because of its quick implementation, with automated user, access and role management, go:Identity helps increase security and reduce costs in the company. Compliance requirements are met and user friendliness is guaranteed. The perfect Identity Manager Tool.

We can implement a typical IDM project, involving MS Active Directory® and synchronization with an HR data source, with an external effort of only 10 days (more information on this below).

Together with the optional go:Identity Secure Access Module, go:Identity offers a comprehensive Identity and Access Management solution.

Resources:

Click here for a quick video about go:Identity:

Want to learn more? Schedule a Webcast for go:Identity

Please tell us your e-mail address and your name. We will then contact you to agree on a demo webcast appointment.

Please enter name
Please enter email address Email address not valid

Why use a preconfigured solution like go:Identity?

Tight IT budgets often keep organizations from implementing the necessary Identity and Access Management solutions.

How can you still automate standard use cases cost-effectively and without much effort?

go:Identity is up and running faster than more traditional Identity & Access Management solutions for the same use cases. It includes features like user provisioning and de-provisioning, user self-service and approval workflows, just to name a few.

Benefits of the go:Identity Appliance approach

Projects with conventional IDM solutions

Project duration
  • Component selection
  • Process analysis
  • IDM best-practice definitions
  • Design of basic processes
  • Development
  • Software QS
  • Training

- High implementation cost

- Long project cycles

- Less to none standardisation

 

go:Identity projects

Project duration
  • Implementaion and Customizing
  • Use Cases Tests
  • Introduction / Training

+ prompt implementation

+ proven processes

+ secure standards

+ compliance without effort

Minimal project risk with
go:Identity

The out-of-the-box approach significantly reduces project risk in our projects. Thanks to the built-in best practice, the processes and functions have already proven their suitability.

Instead of long-running projects with imprecise, slowly emerging results, go:Identity immediately gives you an almost-finished system. It only needs to be configured instead of programmed.

A typical project

IDM projects are not rocket science and do not have to be as complex as it is often portrayed.

Right out of the box, go:Identity offers the exact functions that are important for identity management and that have already proven themselves hundreds of times in practice.

We can realize a complete IDM project, e.g.

  • with Active Directory® as the target system and
  • connection of a HR data source

in collaboration with our customers, with an external effort of

just 10 days

from the first requirements workshop to the go-live.

Stay flexible with
go:Identity

The approach is important

Think in phases so you can start the 1st phase with goals that will quickly bring the greatest benefit, e.g. in the form of reduced effort and increased security.

Additional features can be added in later phases:

  • other target systems (e.g. SAP, Office365, etc.)

  • further automation other scenarios such as access management

  • customer-specific extensions of all kinds

  • and much more.

You can be confident that go:Identity is always prepared for future requirements.

Let us explain to you in a personal webcast
how easy Identity Management can be with go:Identity

Please tell us your e-mail address and your name. We will then contact you to agree on a demo webcast appointment.

Please enter name
Please enter email address Email address not valid

Typical Use Cases for Identity Management

Image

Challenge:
Does high risk = high cost?

A distribution system operator had to provide secure access to critical infrastructure. Managing accounts and maintaining access was error-prone and cumbersome.

Image

Solution:
Automation reduces risk and cost

go:Identity automated account and entitlement management by standardizing the processes. Transparency and high efficiency significantly reduced imminent security risks.

Image

Challenge:
Administration of fileshare permissions

The administration of access to fileshares was time-consuming and insecure, because no comprehensible approvals from business responsible were possible, there was no self-service for requests for access and it was not ensured that unneeded authorizations would also be withdrawn. In addition, the manual effort in IT was immense.
Image

Solution:
Automation, self-service and approval processes

With go:Identity, IT now grants access to fileshares automatically based on the employee’s tasks. Users can request additional access in the go:Identity IT-Shop. The responsible persons approve them, and IT assigns them without any manual steps. Those responsible can now regularly check and correct authorizations. Any authorizations that are not needed are automatically withdrawn.

Image

Challenge:
Azure AD was out of the loop

An electronic parts manufacturer was struggling to integrate Azure AD into central business processes for managing accounts and permissions.

Image

Solution:
Do not exclude cloud services

go:Identity established a secure bridge between the central applications and Azure AD, with real-time synchronization and high data consistency. Azure AD is now integrated despite its location in the cloud.

Image

Challenge:
Compliance audit passed only narrowly

A German financial institution did not fully pass a compliance audit and was facing stiff financial penalties. They found their employee access management was out of compliance. Reporting and attestation were missing as well.

Image

Solution:
Compliance achieved rapidly!

go:Identity consolidated all of the business applications for central permissions management, including attestation and reporting, into a central interface. By doing so, it successfully solved the abovementioned points.
Read the success Story

Technical components and added value from go:Identity

Functional benefits

  • Join / move/ leave of Identities

  • Automate on- and offboarding of employees

  • Self-service / Helpdesk

  • Request and approve of entitlements

  • Password management

  • Review the necessity of access authorizations

  • Ensure auditability (audit and compliance)

  • Recertify access rights and permissions

Technological benefits

  • Ready-made identity management system as an appliance

  • Pre-configured software – no complicated installation (virtual machine (VM))

  • Project-proven workflows and approval processes ready out of the box – can also be configured

  • Integration, go-live and operation on-prem

  • Multi language capability (DE, EN, FR – additional languages on demand)

Connectivity

  • Connection to standard systems, e.g. Microsoft Active Directory, MS Exchange, Notes, LDAP

  • SaaS systems, e.g. Microsoft Azure AD and Office 365, Salesforce, Workday, etc.

  • Business applications, e.g. SAP, Oracle, etc.

  • Databases: Oracle, MSSQL, MySQL, PostgreSQL etc.

  • Unix and Linux

  • Many other connectors

  • Custom integrations, including with customer applications, are simplified with a flexible connector framework

More details about the functionalities of go:Identity are available here under "Functions in detail".
New

go:Identity Fileshare Info

Are you wondering what your users can effectively access on your NTFS-secured file servers?

go:Identity shows you fileshare permissions in the context of Identities by relating the NTFS permissions to the actual memberships in AD groups.

Image

A typical go:Identity Landscape

Easy access

With go:Identity users and administrators simply work via a standard web browser.

Ready-to-use integrations

Ready-made integration modules, known as IDM connectors, exist for a large number of system types.

Easy implementation

The prepared appliance is implemented in your environment in no time at all.

Image

Other products from COGNITUM Software

Managing Roles with go:Roles

go:Roles

The comprehensive tool for entering, designing, controlling and maintaining business role models in Access Management - can be operated independently of the IAM system used.

Cognitum

Cognitum

The development platform for quick and easy creation of standardized and highly secure JAVA-based web applications.