Do you know who has access to your protected systems?
Who authorises access for staff, partners and members of the public?
Can you identify when access policy has been violated?
Let us help you implement a comprehensive attestation and reporting facility that will keep managers responsible for your company’s access governance.
Are your cloud identities securely provisioned?
Can your staff use their cloud identities for federation?
Do you have single sign-on between your on-premise and cloud applications?
Let us help you deploy best-practice identity-as-a-service infrastructure
Do you have central policy administration covering all remote devices?
Are you protocol compliant?
Can you remotely manage company data on personal devices?
Let us assist in developing and deploying a coherent and planned remote device management environment.
Can you satisfy requests from your staff, or public, for access to identity information?
Are you compliant with the Australian Privacy Amendment Act commencing 12 March 2014?
Let us help you develop and implement a robust and cost-effective solution to ensuring identity information is kept private.
Internet Commerce Australia (ICA) is a specialist independent consulting group that advises government and private sector organisations on the harnessing of technologies to implement effective electronic commerce, mobile commerce and public key infrastructure.
Managing identities in an organisation saves money in administration staff and significantly reduces risk by removing staff who have left the organisation from company systems. Ideally HR should manage all identities in an organisation.
Getting the permissions right for staff wanting to access company resources is the main objective of a good identity and access management environment. These days leveraging your identity management and access control infrastructure to support a high authorisation environment is easy to achieve.
The ultimate is deploying a authorisation environment to provide fine-grained access to your protected resources. This should externalise the access control decision to a central policy store managed by the responsible business managers in your organisation.
ICA has been in business since 1996 providing this independent strategic consulting to the Australia, New Zealand and SE Asia markets.
ICA consultants analyse business needs and processes to identify where improvements can best be achieved, where business benefits justify the costs, and recommend the appropriate technology solutions to deliver the identified benefits.