Advertisment

Gemalto Simplifies and Secures Access to Cloud Applications with New Access Management Service

author-image
Rajkumar Maurya
New Update
Gemalto Simplifies and Secures Access to Cloud Applications with New Access Management Service

Gemalto announced the launch of SafeNet Trusted Access, an access management, and identity protection service, to secure cloud and on-premise applications. Powered by a robust risk-based analytics engine, Gemalto’s solution delivers integrated Cloud Single-Sign-On (SSO) and Multi-factor Authentication (MFA) capabilities so companies can easily implement secure, conditional access and additional authentication levels when outlined in the policy engine.

Advertisment

According to recent research, enterprises in 2017 are expected to utilize an average of 17 cloud applications to support their IT, operations and business strategies. With SafeNet Trusted Access a user can log on once to access all approved applications, as defined by the policy for that application.

 

 

Advertisment

Gemalto’s SafeNet Trusted Access key features include:

Scalability- The solution features built-in integration templates making it easy for companies to add new and existing cloud applications as needed

Supports long-term IAM strategy – Companies benefit from a broad range of Gemalto’s stronger authentication methods and form factors such as one-time passwords and biometrics

Advertisment

Risk-based analytics and detailed access policies Scenario-based policies define access controls, assess whether a login attempt is secure, apply the appropriate level of authentication and  require additional security measures when necessary

Visibility – Provides the right level of visibility into workforce identity and access activities & events

Centralized access management A single pane of glass gives visibility into all access events streamlining security audits, tracking and help desk requests like password resets

Advertisment

Regulatory Compliance- IT can ensure compliance with relevant legislation and standards using the solution’s data-driven insights on user behavior, access events, and policy enforcement.

Advertisment