Solutions for the enterprise
Commercial organizations depend on their business processes to ensure profitability and on-time delivery. As a result, solutions that provide improved security and availability must take these business processes into account, or face strong resistance in implementation. As enterprises are faced with more and more requirements for confidentiality, availability and integrity, they must ensure that security is compatible with their business activity.
Evidian identity and access management (IAM) solutions are used worldwide by manufacturing, service and utility companies to secure information access and comply with laws and regulations such as Sarbanes-Oxley and ISO 27001. These companies combine physical and logical access control for their employees, implementing approval workflow over their sites and information system.
Hundreds of thousands of users access their applications every day via Evidian's authentication management solutions. Their tasks are made easier by single sign-on, as they have no passwords to remember anymore. This considerably reduces help-desk workload, ensuring fast return on investment. Access to PCs and applications can be subject to strong authentication via smart card, radio badge, biometrics or one-time password. Self-service password request (SSPR) makes users autonomous, so that employees on the move are never locked away because they forgot their authentication details.
Using Evidian IAM solutions, enterprises deploy identity management and approval workflow to ensure that their access policy is enforced down to individual users and applications. Evidian's solutions are designed to be adaptable and compatible with corporate business processes, such as availability and mobility requirements. This results in security that enhances, rather than hinders, the enterprise's business activity.
Features overviewBrochure - IAM solutions >>
Case studiesCase study - EADS Astrium >>
Case study - G4S France >>
Case study - Navantia >>
Case study - PAREXEL >>
White papersWhite Paper - Golden rules for SSO >>
White Paper - PCI DSS >>
White Paper - Risk management >>