IAM -  Identity and Access Management

Transform your company’s Identity and Access Management practices with Requestia

Automate Access Management

Gestão de identidades e acessos

Automatically Create New Users

Reduce IT efforts by automatically creating new users in Active Directory Office 365, G Suite and other applications. Grant immediate access to new hires or users.

Gestão de identidades e acessos

Grant Access to Systems and Applications

Grant access to systems and applications through approval workflows and automated task routing. Easy to set up and completely auditable.

Gestão de identidades e acessos

Simplify Unblocking Accounts

Simply and securely unblock user accounts, starting with PI confirmation.

Gestão de identidades e acessos

Automatically Create New Users

Reduce IT efforts by automatically creating new users in Active Directory Office 365, G Suite and other applications. Grant immediate access to new hires or users.

Gestão de identidades e acessos

Grant Access to Systems and Applications

Grant access to systems and applications through approval workflows automated task routing. Easy to set up and completely auditable.

Gestão de identidades e acessos

Simplify Unblocking Accounts

Simply and securely unblock user accounts, starting with PI confirmation.

Gestão de identidades e acessos

Streamline AD Management

Automate AD data management by integrating with IAM, reducing time and increasing security.

Gestão de identidades e acessos

Restrict Access by Time of Day

Enable managers to restrict network access by time of day, configurable through self-service.

Gestão de identidades e acessos

Manage Group and Folder Access

Set rules determining who can access which groups and folders.

Gestão de identidades e acessos

Streamline AD Management

Automate AD data management by integrating with IAM, reducing time and increasing security.

Gestão de identidades e acessos

Restrict Access by Time of Day

Enable managers to restrict network access by time of day, configurable through self-service.

Gestão de identidades e acessos

Manage Group and Folder Access

Set rules determining who can access which groups and folders.

Strengthen your company’s information security

Conciliação de acessos

Policy Reconciliation for Access Controls

Ensure integrity among corporate systems through automated access reconciliation.

Ciclo de vida de acessos

Access Lifecycle Management

Leverage universal and consistent protocols at every step of access management from onboarding to offboarding,
for full-time employees or outside contractors.

Atestação de acessos

Attestation

Automatically carry out attestation for all users based on previously defined elements. Managers and team leaders can periodically review and evaluate access levels to see if any have crossed a risk threshold.

Conciliação de acessos

Policy Reconciliation for Access Controls

Ensure integrity among corporate systems through automated access reconciliation.

Ciclo de vida de acessos

Access Lifecycle Management

Leverage universal and consistent protocols at every step of access management from onboarding to offboarding,
for full-time employees or outside contractors.

Atestação de acessos

Attestation

Automatically carry out attestation for all users based on previously defined elements. Managers and team leaders can periodically review and evaluate access levels to see if any have crossed a risk threshold.

RBAC

Adopt RBAC

Automate access governance by setting restrictions to systems and data based on employees’ roles. By utilizing RBAC you can increase security of sensitive applications and data.
the access profiles.

segregações de funções

SOD Implemente

Protect high risk departments, like IT and Accounting, from fraud with SOD. Define roles and responsibilities, eliminate conflict of interest and reduce risk of internal data breaches.

contas orfãs

Eliminate Orphan Accounts

Do you know how many orphan accounts and privileged users are on your network? Automatically discover and eliminate orphan accounts company wide, reducing compliance risk and network pollution.

RBAC

Adopt RBAC

Automate access governance by setting restrictions to systems and data based on employees’ roles. By utilizing RBAC you can increase security of sensitive applications and data.
the access profiles.

segregações de funções

SOD Implemente

Protect high risk departments, like IT and Accounting, from fraud with SOD. Define roles and responsibilities, eliminate conflict of interest and reduce risk of internal data breaches.

contas orfãs

Eliminate Orphan Accounts

Do you know how many orphan accounts and privileged users are on your network? Automatically discover and eliminate orphan accounts company wide, reducing compliance risk and network pollution.

Ensure audit and policy compliance

Requestia’s IAM platform has built in support to provide detailed reports for audits and the following regulations:
Requestia’s IAM platform has built in support to provide detailed reports for audits and the following regulations:

GDPR

General Data Protection Regulation.

SOX

Lei Sarbanes-Oxley.

PCI DSS

Payment Card Industry Data Security Standard.

HIPAA

Health Insurance Portability and Accountability Act.

PQO – B3

Operational Qualification Program.

Talk to an
expert

Converse com Especialistas Requestia

How to adapt by adopting Access Management principles.