GATEONE-Z provides the fully integrated account management and access (IAM) system including system access control, account management, password management and log audit based on the best technology in the country.
- We continue to establish and keep a firewall which led the security market and protection equipment·that can encounter the external aggression such as VPN. - But 70% of the security accidents are seizure of financial authority and leakage of client’s DB information due to the·insufficiency of employee’s security solution.
• Preparation of Authority Separation for System Access of Each User • Application of Workflow Foundation, Approval Procedure and Audit Preparation • Understanding the Content Authority Use Through Application Record of System Access Authority and Log Analysis of Action Audit
• Provision of Automated Account Management System Through Personal System and Linkage (Provisioning) • Understanding the History of Account Uses using Data such as Account Application Records and Condition of Use • Effective Account Management Using Life-Cycle Management
• Preparation of Password Regulation System that Satisfies Security Regulations • Preparation of Effective Password Automatic Change System in Several Periodical Settings • Preparation of a Automatic Return System Using Shared Account Password Management System
• Provision of Access Control System for Each User • Provision of Account Use Condition for Each User • Provision of Authority Application and Control Regulation Condition • Provision of Laws/Regulation and Evidence
Controls of each user's access rights to the system
2 Factor Authentication OTP / AD / Radius / SSO / PKI
Supports of a variety of environments through the application of Rule-based policies
CLI task monitoring and GUI task monitoring CLI task log and GUI video log
Detection of illegal accountand policyviolations and dispatch of events
Life Cycle management about personal account and shared account
Reinforcement of account security through the account right control and password management for each user
Controls of each user's access rights to the system
2 Factor Authentication OTP / AD / Radius / SSO / PKI
Supports of a variety of environments through the application of Rule-based policies
CLI task monitoring and GUI task monitoring CLI task log and GUI video log
CLI Work Log and GUI Video Log
Detection of illegal account and policy violations and dispatch of events
Life Cycle management about personal account and shared account
Reinforcement of account security through the account right control and password management for each user