86
.
%
of web breaches caused by credential abuse
50
.
%
of social engineering incidents are Business Email Compramise (BES) attacks
74
.
%
of breaches involved the human element - social errors, mistakes, misuse
What is Identity and Access Management
Identity and Access Management (IAM) is built on two core concepts; identities and access. On one hand, you can boost productivity and security by central management of the whole identity lifecycle of even your non-employee users. On the other, you ensure the right person access the right resource at the right time and under the right conditions.
In a Zero Trust World
The right
people
have the right level of access
to the right resources
in the right context
that is assessed continuously
Users
Identities
Groups
Zones
Credentials
External Directory
( LDAP, AD, DB, etc)
Directory Services
User Provisioning
User Deprovisioning
Automatic Group /
Role Assignment
Workflows
User Lifecycle
Management
Primary Authentication
Multi-Factor Authentication
Reverse Authentication
Passwordless Authentication
Authentication Source / Sequence
Authentication
Authorization
Rules
Roles
Attributes
Adaptive Access
SECURIFY IAM COMPONENTS
Securify Access supports various authentication flows
Standard Flow
Primary Authentication
(User Name, Password)
-->
2nd Factor Authentication or MFA
Reverse Flow
User Name
-->
2nd Factor Authentication
-->
Password
Passwordless Flow
User Name
-->
2nd Factor Authentication
or MFA
Streamline User Lifecycle Management with Automated Workflows
JOINER
Just in Time
Scheduled
Create User
Create Identity
Assign Roles
Assign Groups
Enforce Access Rules Workflow
Source Identity
HR Systems
Directories
Workflow Rule Triggers
MOVER
Job Changes
Promotions
Marriage
Leave of Absence
Update Attributes
Update Roles/Groups
Update Access
LEAVER
Immediate
Scheduled
Remove Groups
Remove Roles
Remove Identity
IDENTITY MANAGEMENT FEATURES
Local Directory
Securify has a built-in local directory where users, identities and credentials can be defined.
Multi-Directory Support
Securify supports multi directory sync and identity federation.
External Directory
Securify has the ability to migrate users from external directories such as LDAP, AD, Azure, or a Database and supports immediate and scheduled synchronization.
Attribute Mapping
Securify has an advanced attribute mapping capability where different rules can be enforced during the mapping.
Just-In-time Provisioning
Securify can provision users just after the first primary authentication without making any pre-sync action
Identity Level Settings
Securify Identity module enables instant changes to identity status, MFA status, or Factor type.
ACCESS MANAGEMENT FEATURES
Zone Based Access
Securify supports Access Control based on IP address, Geolocation, Country and more.
App Based Access
Securify can enforce rules specific to the application to be accessed.
Time and Browser Based Access
Securify supports Access Control based on Access Time and/or Browser in use.
Fine Grained MFA
Securify is able to set/update MFA Factors in various levels; identity, applications, groups.
Role Based Access
Securify can define and enforce rules according to groups/roles of users.
Adaptive MFA
Securify Adaptive Rules can activate/deactivate MFA using login history (same Browser/IP, recent login time, etc.).
PRODUCTS
SECURIFY
MFA
SECURIFY
ACCESS
SECURIFY
SSO
SECURIFY
BEHAVIORAL