CloudAccess Identity and Access Management Packages Updated with New Application and Platform Connectors

Cloud security firm adds salesforce.com, SAP ECC, AS400, GoogleApps and to its growing advanced adapter library.

Los Angeles, CA, July 29, 2013 --(PR.com)-- CloudAccess, the only IT security firm to currently offer a fully integrated cloud-based identity management (IDaaS) and single sign on (SSO) package, announced the addition and update of several critical application connectors.

Part of the recently launched “Advanced Adapter Series,” connectors (application programming interface also known as API) for salesforce.com, SAP ECC, AS400 iSeries and GoogleApps received an upgrade to better facilitate automatic provisioning, reconciliation and password management combined with a seamless integration CloudAccess’ enterprise access control solution.

“What we have done is close the loop on security management for various key applications,” said CloudAccess CEO Kevin Nikkhoo, “Clients with these apps or platforms can now better control who accesses what data.”

The connectors facilitate important security functions such as the assigning of certain privileges to certain applications and data based on corporate role or need-to-know policies. Using these cloud-based functions, the typically laborious process is automatic and instantaneous throughout an enterprise. This includes the on-demand creation and removal of user accounts, maintenance of passwords (including user self-service) and reporting for compliance audits.

“Considering the proliferation of applications that need to be accessed by employees, partners, suppliers and customers, our growing library of connectors simply make it easier and less expensive to protect the network,” Nikkhoo noted.

Although the connectors are a component of an identity management solution (CloudIDM), the seamless integration with CloudAccess’ Access Management (CloudAM) solution ensures the continuous control of user credential protection across an enterprise regardless of size, hierarchical complexity or operational preferences. It also promotes authentication best practices, centralizes management of an application portfolio and satisfies regulatory compliance.

According to CloudAccess, many organizations do not discern the difference between identity management and access management. Although both serve to secure an aspect of a user’s ability to utilize certain portions of a company’s IP assets, Identity Management (IDM) controls the creation and maintenance of a user’s digital rights and password security. Access management (sometimes referred to as single sign on or SSO) controls the funneling of these privileges to directly access certain applications and data from a central portal. Both are part of an end-to-end, unified security initiative.

There is no other company that currently provides a multi-tenant cloud security option for both identity and access management as an integrated solution set.

Currently CloudAccess promotes federated access connectors for several dozen popular applications. Additionally, using the company’s proprietary identity gateway solution, hundreds of legacy and web applications are additionally enabled for credential administration (identity management) and enterprise access distribution (access management).

Contact CloudAccess at www.cloudaccess.com/contact to schedule a demo for the integrated identity management and access management solutions or call 877-550-2568 for more information.
Contact
CloudAccess
Scott Davis
877-550-2568
www.cloudaccess.com
Blog-Thoughts from the Cloud: www.cloudaccess.com/blog/
ContactContact
Categories