Security

Key Features

  • Advanced & automated identity and access for IT employee onboarding
  • Central RBAC model with employee roles in the focus
  • Access model for segregation of management & data plane
  • Central IAM incl. temporary privilege access and location based awareness
  • Central tech / non-human mgmt.
  • Centralized and federated vault / wallet / secret & certificate mgmt.