Do you know who has access to your protected systems?
Who authorises access for staff, partners and members of the public?
Can you identify when access policy has been violated?
Let us help you implement a comprehensive attestation and reporting facility that will keep managers responsible for your company’s access governance.
Are your cloud identities securely provisioned?
Can your staff use their cloud identities for federation?
Do you have single sign-on between your on-premise and cloud applications?
Let us help you deploy best-practice identity-as-a-service infrastructure
Do you have central policy administration covering all remote devices?
Are you protocol compliant?
Can you remotely manage company data on personal devices?
Let us assist in developing and deploying a coherent and planned remote device management environment.
Can you satisfy requests from your staff, or public, for access to identity information?
Are you compliant with the Australian Privacy Amendment Act commencing 12 March 2014?
Let us help you develop and implement a robust and cost-effective solution to ensuring identity information is kept private.
ICA provides specialist independent advice and guidance on implementing effective solutions in the following IT Infrastructure areas:
ICA also provides specialist Information Technology in the transport and logistics sector on: