GITEX 2024

INTELLIGENT ACCESS REVIEWS

decision making with the power of advance analytics, machine learning (ML) and visualization.

Reduce the number of decisions to make by performing risk-driven and/or event-driven access reviews. Improve effectiveness by providing the right context to the decision maker, collected from various relevant systems. Robust and Responsive System, decoupled from your IAM Platform and seamlessly integrates to your ITSM Platform.

   

IDENTITY ANALYTICS

refine identity and access data quality using AI/ML techniques and crowdsourcing.

Identify and remediate Identity Data Issues before feeding them to IAM workflows through Delegated administration/ownership. Implement advanced IAM controls and policies like Separation of Duties, Attribute Based Access Control (ABAC), Entitlement Management etc., leveraging Identity Knowledge Graph.

   

VISUALIZE, MINE AND MANAGE ROLES

deterministic role mining approach with visualization to compare and contrast roles.

Spark based unsupervised role mining engine with data classification and association mining approaches.Leverages Spark based Top-down & Bottom-up mining approach. Reduce complexity for Role discovery and Access Reviews. Integrates with SailPoint, Oracle Identity Governance and other IAM platforms.

   

Just In Time Access

enhance security by removing standing privileges, granting access only when needed for optimal control and compliance.

Just-In-Time Access (JIT), also known as Zero Standing Privileges (ZSP), reduces security risks by eliminating permanent access. Instead, privileges are granted only when needed, applying the least privilege principle. Authorized users must ‘Activate’ their access within predefined conditions and time frames, as governed by policy.

   

APPLICATION ONBOARDING & GOVERNANCE

streamlined application lifecycle & security controls assessments.

Manage Application Lifecycle driven by Organization’s Configuration Management System (CMDB), including automated enrollment of the application to various IAM services based on the application metadata. Ensure application complies with Organization defined security controls on a continuous basis through event driven security compliance assessments.

 

LASTMILE IGA SOLUTION & SERVICES

Identity and Access Management Solutions and Services.

IDENTITY MANAGEMENT & GOVERNANCE

Extensive experience with Identity Management solution design, customization and integration

ACCESS MANAGEMENT & SSO

Authentication, authorization, auditing and Web SSO solution

ROLE BASED ACCESS CONTROL (RBAC)

RBAC methodology and Entitlement Management: Design and Implementation of Role Based Access.

FEDERATED IDENTITY MANAGEMENT

Context and Policy-based integrated web security management and Federated SSO for employees, partners and customers.

SECURITY INFORMATION MANAGEMENT AND COMPLIANCE

Audit, Compliance management and Reporting across the enterprise IT resources.

DIRECTORY SERVICES

Integration solutions with Directory Services, Federated Directory, Virtual Directory.

CUSTOM CONNECTOR DEVELOPMENT

Infrastructure Connector, Application Connector, Cloud / REST Connector.

UI CUSTOMIZATIONS

Packaged library for Custom UI development.

UPGRADE AND MIGRATION

Upgrade and Migration of IAM components.