Identity and Access Management (IAM)

Identity and Access Management (IAM) provides employees safe access to all the systems they need.

[Only the access you need]

What is IAM?

Privileged Access Management (PAM) is a way of providing various employees more rights and different types of access. External employees, for example, require different (temporary) rights than internal staff. In Topicus KeyHub, more rights and access is provided according to Just-in-Time provisioning. Topicus KeyHub hereby offers all the possible IAM solutions in one.

Employees belong to a group and are therefore given access to the systems that they minimally require for their work. The access is user-friendly and safe with Multi-Factor Authentication (MFA). Employees and team leaders know best which systems they require for their work. With KeyHub, it is possible to temporarily assign more rights to responsible users.

01.2 - IDENTITY AND ACCESS MANAGEMENT - CONTENT - HALF - 450 x 477

 

"You won't start to see it until you understand it."

Request a FREE Demo and discover the power of KeyHub.
[Everyone has limited access rights]

IAM and PAM

Privileged Access Management (PAM) is a way of providing various employees more rights and different types of access. External employees, for example, require different (temporary) rights than internal staff. In Topicus KeyHub, more rights and access is provided according to Just-in-Time provisioning. Topicus KeyHub hereby offers all the possible IAM solutions in one.

Employees belong to a group and are therefore given access to the systems that they minimally require for their work. The access is user-friendly and safe with Multi-Factor Authentication (MFA). Employees and team leaders know best which systems they require for their work. With KeyHub, it is possible to temporarily assign more rights to responsible users.

01.3 - IDENTITY AND ACCESS MANAGEMENT - CONTENT - FULL - 1281 x 488
[No unnecessary access is provided]

Access governance

Access governance consists of rules, protocols and services that combats the unnecessary provision of access and enforces appropriate access to digital systems and sensitive information. Topicus KeyHub was built on two principles that support this. On the one hand, you have the principle of Least Privilege, in which users are provided with the minimum number of rights in order to do their work. 

And, on the other hand, you have Just-in-time provisioning, in which rights are temporarily assigned and automatically expire after a certain amount of time. The comprehensive Audit functions of KeyHub help create openness about the security policy. This helps ensure your compliance to all the applicable rules and protocols in regard to digital security.

 

[Only safer if it is used]

IAM and ease of use

Employees come and go at organisations. In Topicus Keyhub, providing and revoking access rights for employees is quickly and easily arranged. Employees are invited by their team leader or they request access to the systems on their own. Without the intervention of a system administrator, teams can determine who gets what kind of access.

Team leaders can thereby arrange the on-boarding and off-boarding of employees faster, easier and safer. Employee login to Topicus KeyHub with Two-Factor Authentication (2FA), after which the user is given automatic access to the other systems with Single Sign-On (SSO).

[null]

IAM with transparency

For the employees in the teams, it is perfectly clear who has access to what. Topicus KeyHub provides insight into which employee is authorised for what. An Audit trial automatically keeps track of who has access to what and at which times.

This keeps employees alert to any possible security breaches. In addition, employees also receive relevant notifications if actions are required. For example, a notification for a team member when access to a group is requested.

[Safety must comply with all the relevant laws and regulations]

IAM and compliance

To ensure compliance, IAM must comply with all the laws, regulations and standards. Topicus KeyHub helps ensure that you maximally comply with the most important standards that apply for digital security. It enables audits for such certifications as ISO 27001, NEN 7510, SOC 2 and the GDPR to be carried out quickly.

Topicus KeyHub offers one-touch insight into who has access with the Audit trail via the Auditor Dashboard. The authorisation matrix and audit trails can always be exported for further analysis. KeyHub hereby makes the information you need for a successful Audit automatically accessible.

"You won't start to see it until you understand it."

Request a FREE Demo and discover the power of KeyHub.