OUR SOLUTIONS

Enterprise Security Management

 

User Security Management

Puleng Technologies is a specialist Identity and Access Governance Management Company, with over five million user identities under management and the largest number of enterprise environments in production in South Africa. A strong User Governance framework is the thread which ensures that the right Users have access to the right Services while providing business advantage through self-enrolment, user life-cycle and a quality customer experience.

 

 

 

  • IDENTITY MANAGEMENT
  • ACCESS MANAGEMENT
  • ACCESS GOVERNANCE
  • FEDERATED IDENTITY AND CLOUD MANAGEMENT
  • PRIVILEGED ACCESS

Puleng has the leading professional services team and honed a milestone-based implementation methodology that delivers predictable project success.

 

IDENTITY MANAGEMENT

Identity management provides self-service for users, automated lifecycle management across heterogeneous platforms. Identity Management facilitates a rich policy framework for enforcing corporate security policies and enabling detailed audit capabilities. This protects IT infrastructure from information theft and helps the organisation to comply with regulations.
Identity management facilitates the creation, automation and enforcement of business policies that strengthen security.

FEATURES AND BENEFITS

  • Automated Provisioning
  • Audit Reporting
  • User Lifecycle Management
  • Access Approval
  • Access Fulfilment
  • Access Review and Certification
  • Identity Policy Management

ACCESS MANAGEMENT

Access management solutions securely manage access to business-critical applications and data. These solutions provide centralised authentication and authorisation, policy management and access control services for Web resources, systems and hosted applications. Single Sign-On (SSO) improves the user experience and reduces help-desk costs.
Centralise the management of two-factor authentication functions, security tokens and user across the enterprise.

FEATURES AND BENEFITS

  • Single Sign-On
  • Multi-factor Authentication
  • Fine-grained Authorisation
  • Centralised Policy Database
  • Enhance User Experience
  • Auditing and Monitoring User Access

ACCESS GOVERNANCE

Access Governance offers visibility regarding who has access to what information resources within an organisation. Governance implies that the control of access is driven by policy as well as procedure. Access Governance systems are of significant importance to enterprises due to an increased emphasis on regulatory compliance and heightened sensitivity to insider threat.
IT organisations can reduce access management complexity and increase operational efficiency while minimizing risk and ensuring compliance.

FEATURES AND BENEFITS

  • Enterprise Wide View Storage health
  • Storage Charge Back
  • Validate Storage Compliance
  • Detailed Performance Analysis

FEDERATED IDENTITY AND CLOUD MANAGEMENT

Federated Identity Management provides web and federated single sign-on (SSO) to end users across multiple applications. Browser based integration and open standards provides short term gains in user productivity, user experience and reduction in administration costs. Enterprises adopting cloud based services can leverage federated single sign-on for secure information sharing across private, public and hybrid cloud deployments.
Implement a powerful identity mediation service for Cloud, SaaS and Web services.

FEATURES AND BENEFITS

  • Internal Single Sign-on
  • Workforce to Cloud
  • 3rd Party Service Aggregation
  • Secure Token Services
  • Social Identity
  • Business Partner Single Sign-on

PRIVILEGED ACCESS MANAGEMENT

A privileged account is typically the administrator, super-user or root account for a given system and provides the capability, not only to reconfigure and/or apply modifications to a system and/or its components, but also to access any information that is held on the system. Security and management of these privileged accounts is a priority for all enterprises.
When users require use of a privileged account, the "Username" and "Password" is booked-out from the automated self-service Password Safe.

FEATURES AND BENEFITS

  • Password Safe
  • Least Privilege
  • Unix/Linux Servers
  • Windows Servers and Desktops
  • Applications and Databases
  • Reduce IT Security Risk

 

LET'S discuss a solution for you