CloudAccess Fortifies and Integrates ID, Access Management: Releases CloudIAM 4.0

Cloud security firm improved functionality and interoperability with CloudIAM 4.0.

Los Angeles, CA, April 11, 2014 --(PR.com)-- Despite promoting one of the leading cloud-based identity management tools on the market, cloud security firm CloudAccess released several new improvements to its provisioning solution including seamless and centralized integration of an access control component.

CloudIAM 4.0, now provides a singular interoperable console to control administrative security tasks such as provisioning users from any database source, controlling permissions and profiles, resetting passwords, managing privileges to specific applications, and channeling access through a single sign on portal.

CloudAccess is the only company that currently provides a multi-tenant cloud security option for both identity and access management as an integrated solution set.

According to CloudAccess, CloudIAM not only processes cloud-based infrastructure but can seamlessly interact and control on-premise deployments. Besides the full integration with Microsoft Active Directory, several new SaaS application connectors to leading enterprise source applications are also available including SAP, JDE, Oracle and Concur.

“We facilitate and protect the essential communication between the on-premise application, SaaS and the identity source database used for account authentication,” said CloudAccess CEO Kevin Nikkhoo, “The result is the right people get to see the right application in a secure and compliant environment.”

In this latest release, CloudAccess instituted several other game-changing improvements including the ability to provide fine-grain delegated administration (allowing any selected user to manage any module), full enable/disable/delete users from a directory and support for multiple directories with bi-directional synchronization.

CloudIAM is also part of CloudAccess’ REACT security platform which correlates data from virtually any security product and application, analyzes that data for behavioral anomalies, applies and enforces organizational security policies and secures the data in real time. This includes the data collected from user activity, provisioning, application access and other elements typically controlled and monitored through identity and access management.

Contact CloudAccess at www.cloudaccess.com/contact to schedule a demo for the integrated identity management and access management solutions or call 877-550-2568 for more information.
Contact
CloudAccess
Scott Davis
877-550-2568
www.cloudaccess.com
Blog-Thoughts from the Cloud: www.cloudaccess.com/blog/
ContactContact
Categories