Issuu on Google+

Identity and Access Management Solutions


ã¹Âؤ»˜¨¨ØºÑ¹ ·Ø¡¤¹º¹âÅ¡¢Í§ÃкºÍÔ¹àµÍÃà¹çµ äÁ‹Ç‹Ò¨Ð໚¹¾¹Ñ¡§Ò¹ ¤‹Ù¤ŒÒ 仨¹¶Ö§ÅÙ¡¤ŒÒ µ‹Ò§ÅŒÇ¹àª×èÍÁµ‹Í¶Ö§¡Ñ¹Í‹ٺ¹à¤Ã×Í¢‹Ò¢ͧͧ¤¡Ã´ŒÇ ෤â¹âÅÂÕ·Ò§´ŒÒ¹äÍ·Õ áÅСÒ÷ÕèᵋÅФ¹¨Ó໚¹µŒÍ§ÁÕ¡ÒÃàª×èÍÁµ‹Í ÃÐËÇ‹Ò§¡Ñ¹à»š¹¨Ó¹Ç¹ÁÒ¡ àÃ×èͧ¢Í§¡ÒúÃÔËÒèѴ¡ÒÃÃкº¢ŒÍÁÙÅʋǹµÑÇ ¢Í§¼ŒÙ㪌§Ò¹Ãкº (User Profile) ¡ÒÃࢌҶ֧áÅÐáÅ¡à»ÅÕè¹¢ŒÍÁÙÅ·ÕèÊÓ¤Ñ− ·Ò§¸ØáԨ ໚¹»˜¨¨Ñ·Õ赌ͧ¹Ö¡¶Ö§áÅШÓ໚¹·Õè¨ÐµŒÍ§ºÃÔËÒèѴ¡ÒÃ໚¹Í‹ҧ´Õ â´Â੾ÒÐã¹àÃ×Íè §¢Í§¤ÇÒÁ»ÅÍ´ÀÑ ¤ÇÒÁ໚¹Ê‹Ç¹µÑÇ áÅСÒõÃǨÊͺ䴌 ˹Öè§ã¹à·¤â¹âÅÂÕ«Öè§à»š¹á¹Ç·Ò§·ÕèàËÁÒÐÊÁÊÓËÃѺ¡ÒúÃÔËÒâŒÍÁÙÅ¡ç¤×Í Identity and Access Management ໚¹à·¤â¹âÅÂÕÃкº¡ÒèѴ¡ÒâŒÍÁÙÅ à¾×èÍáÊ´§µÑǵ¹ ·Õ誋ǤǺ¤ØÁ¡ÒÃࢌÒÊ‹ÙÃкº ª‹ÇÂãËŒ¼ŒÙÁÕʋǹà¡ÕèÂÇ¢ŒÍ§ 㹸ØáԨÊÒÁÒöࢌҶ֧ »ÃÐÁÇżŠáÅÐÊ‹§¢ŒÍÁÙÅÊÓ¤Ñ−ä»ÂѧÃкº·Õèà¡ÕèÂÇ¢ŒÍ§ 䴌͋ҧ»ÅÍ´ÀÑ ¡ÒúÃÔËÒèѴ¡ÒüŒÙ㪌à¤Ã×Í¢‹Ò·Ñé§ÀÒÂã¹áÅÐÀÒ¹ͧ͡¤¡Ã໚¹Ë¹ŒÒ·Õè¢Í§ ½†ÒÂäÍ·Õ «Ö觨Ó໚¹µŒÍ§ËÒá¹Ç·Ò§áÅÐ Solution ·ÕèàËÁÒÐÊÓËÃѺ¡Òà ºÃÔËÒÃâ´Â੾ÒСÒèѴ¡ÒõÑǵ¹ã¹Ãкº´Ô¨ÔµÍÅ (Digital Identity) «Öè§ã¹ ʋǹ¹Õé·Ò§àÃÒÁÕ·ÕÁ§Ò¹·ÕèÁÕ¤ÇÒÁàªÕèÂǪÒ− áÅлÃÐʺ¡Òó 㹡ÒÃãËŒ ¤Ó»ÃÖ¡ÉÒ á¹Ð¹Ó Í͡Ẻ ãËŒ¡ÑºÍ§¤¡Ãµ‹Ò§æ 㹡ÒÃÇÒ§Ãкº Identity and Access Management Ẻ¤ÃºÇ§¨Ã ÃÇÁ¶Ö§¡Òà Implementation à¾×èÍãËŒ¡ÒúÃÔËÒèѴ¡Òà User Profile à¡Ô´»ÃÐÊÔ·¸ÔÀÒ¾ÊÙ§ÊØ´ÊÓËÃѺͧ¤¡Ã

The New Trend : GRC (Governance, Risk Management and Compliance) 㹡ÒúÃÔËÒèѴ¡ÒäÇÒÁ»ÅÍ´ÀÑÂÃкºÊÒÃʹà·È (IT Security Management) ¨Ðãªéá¹Ç·Ò§¡ÒúÃÔËÒäÇÒÁàÊÕè§ã¹ÀÒ¾ÃÇÁ (Holistic Risk Management) ÃÇÁ·Ñ駻Ѩ¨Ñ´éÒ¹¡®ÃÐàºÕº áÅТéÍ¡®ËÁÒµèÒ§æ ¶Ù¡¹ÓÁÒ ¾Ô¨ÒóҴéÇÂã¹â¤Ã§¡Ò÷Õèà¡ÕèÂÇ¢éͧ¡Ñº¡ÒúÃÔËÒèѴ¡ÒäÇÒÁ»ÅÍ´ÀÑ ÃкºÊÒÃʹà·È ´Ñ§¹Ñé¹ ¡®ÃÐàºÕº áÅТéÍ¡®ËÁÒµèÒ§æ (Regulatory Compliance) ¨Ö§¡ÅÒÂà»ç¹àÃ×èͧÊÓ¤Ñ−áÅÐÁռšÃзºâ´ÂµÃ§¡Ñºâ¤Ã§ÊÃéÒ§ ¾×é¹°Ò¹ (IT Infrastructure) ¢Í§Í§¤ì¡Ã ÍÂèÒ§ËÅÕ¡àÅÕè§äÁèä´é ÈÑ¡ÂÀÒ¾·Õè´Õ¡ÇèҢͧÃкº¡ÒúÃÔËÒèѴ¡ÒôéÒ¹¤ÇÒÁ»ÅÍ´ÀÑÂáÅСÒà ºÃÔËÒèѴ¡ÒõÑǵ¹ËÃ×Í Identity and Access Management ¤×ͤӵͺ ¢Í§¤ÇÒÁ·éÒ·Ò¢éÒ§µé¹¹Õé àÃ×èͧ¢Í§Ãкº Identity and Access Management äÁèãªè»Ñ−ËÒ·ÕèàÃҨРÁÒµÑ駤ӶÒÁ¡ÑºµÑÇàͧÇèÒàÃÒ¤ÇèÐÁÕËÃ×ÍäÁè áµè¤ÇèеÑ駤ӶÒÁ¡ÑºµÑÇàͧ ÇèÒàÃÒ¤ÇèÐÁÕÁѹàÁ×èÍäËÃèáÅÐã¹ÃÒ¤Òà·èÒäËÃèÁÒ¡¡ÇèÒ «Öè§Í§¤ì¡Ã¸ØáԨ ÊèǹãË−è¡çàÃÔèÁ·Õè¨Ðà¢éÒã¨áÅéÇÇèÒÃкº¡ÒúÃÔËÒèѴ¡ÒôéÒ¹¤ÇÒÁ»ÅÍ´ÀÑ Identity and Access Management ¹Ñ鹶×ÍÇèÒÁÕ¤ÇÒÁÊÓ¤Ñ−àªè¹à´ÕÂǡѺ Áҵðҹ´éÒ¹¤ÇÒÁ»ÅÍ´ÀÑÂáÅФÇÒÁÊÒÁÒö¢Í§Í§¤ì¡Ã¸ØáԨ Identity and Access Management ¤×Í¡ÒúÃÔËÒèѴ¡ÒèҡÈÙ¹Âì¡ÅÒ§ áÅСÒúÃÔËÒèѴ¡ÒÃÅѡɳÐ੾ÒзÕèà»ç¹´Ô¨Ô·Ñżèҹǧ¨ÃªÕÇÔµ·ÕèÊÁºÙÃ³ì ¢Í§¾¹Ñ¡§Ò¹áµèÅФ¹ (Employee Identity Life Cycle Management) ǧ¨ÃªÕÇÔµ¨ÐàÃÔèÁàÁ×èͼÙéãªéËÃ×;¹Ñ¡§Ò¹ä´éà¢éÒÁÒ·Ó§Ò¹ÀÒÂã¹Í§¤ì¡Ã «Öè§ ¶×ÍÇèÒä´éà¢éÒÁÒÊÙèÃкº¨¹ÍÍ¡ä» ã¹ÀÒÉÒ·ÑèÇä»ËÁÒ¤ÇÒÁÇèÒ ¡ÒáÓ˹´ ÇèÒã¤ÃÊÒÁÒöà¢éÒ¶Ö§¢éÍÁÙÅÍÐäÃä´éºéÒ§

Next Generation Security Challenges

¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¡Ѻ¤ÇÒÁÊдǡʺÒÂäÁ‹ä´Œà»š¹àÃ×èͧ·Õè¨Ðä»´ŒÇ¡ѹ ä´Œ§‹ÒÂæ ´Ñ§¹Ñ鹨֧໚¹Ë¹ŒÒ·Õè¢Í§¼ŒÙºÃÔËÒý†Ò¢ŒÍÁÙÅ ËÃ×Í·ÕèàÃÕ¡¡Ñ¹·ÑèÇæ ä»Ç‹Ò CIO ¢Í§áµ‹ÅÐͧ¤¡Ã ·Õè¨ÐµŒÍ§·Ó˹ŒÒ·ÕèËҨشàª×èÍÁ⧷ÕèàËÁÒÐÊÁ ÃÐËÇ‹Ò§¡ÒÃÃÑ¡ÉÒÃкºâ¤Ã§¢‹Ò¾×é¹°Ò¹¢Í§ºÃÔÉÑ·ãËŒ»ÅÍ´ÀÑ ᵋÊÒÁÒö ࢌҶ֧䴌Í‹ҧ§‹Ò´ÒÂ

ÊÓËÃѺͧ¤ì¡Ã¸ØáԨ Ãкº¡ÒúÃÔËÒèѴ¡ÒôéÒ¹¤ÇÒÁ»ÅÍ´ÀÑÂÊÒÃʹà·È ´éÇ Identity and Access Management à»ç¹ÇÔ¸¡Õ Ò÷ÕèÁÕ»ÃÐÊÔ·¸ÔÀÒ¾ 㹡ÒáÓ˹´ÍÀÔÊÔ·¸ÔìáÅÐÊÔ·¸Ô㹡ÒÃà¢éÒ¶Ö§¢éÍÁÙŢͧ¾¹Ñ¡§Ò¹áµèÅФ¹ àªè¹ ¡ÒÃãËéÊÔ·¸Ôá¡è¤ÍÁ¾ÔÇàµÍÃìâ»Ãá¡ÃÁàÁÍÃì 㹡ÒÃà¢éÒ¶Ö§ÃËÑʢͧ «Í¿µìáÇÃìáµè¤Çº¤ØÁÊÔ·¸Ô㹡ÒÃà¢éÒ¶Ö§ÃÒ§ҹ´éÒ¹ºÑ−ªÕ à»ç¹µé¹ â´Â ¾¹Ñ¡§Ò¹·Ø¡¤¹¨Ðä´éÃѺÊÔ·¸Ô㹡ÒÃà¢éÒ¶Ö§¢éÍÁÙŵÑé§áµèàÃÔèÁà¢éÒÁÒ·Ó§Ò¹ÀÒ ã¹Í§¤ì¡ÃáÅÐàÁ×èÍä´éÃѺ¡ÒÃàÅ×è͹µÓáË¹è§ áÅШж١àÍÒÊÔ·¸Ô´Ñ§¡ÅèÒÇ ¤×¹àÁ×è;¹Ñ¡§Ò¹ÅÒÍÍ¡ä» ÍÂèÒ§äáçµÒÁ ¶éÒͧ¤ì¡ÃÁÕ¾¹Ñ¡§Ò¹à»ç¹¾Ñ¹¤¹ ¢Öé¹ä» Áѹ¡çÍÒ¨¨Ðà»ç¹àÃ×èͧÂÒ¡áÅÐàÊÕ¤èÒãªé¨èÒÂÊ٧㹡ÒõÒÁµÃǨÊͺ ÍÀÔÊÔ·¸Ôì¢Í§¾¹Ñ¡§Ò¹áµèÅФ¹â´ÂäÁèãªéÃкºÍѵâ¹ÁѵÔà¢éÒªèÇ ´Ñ§àªè¹ã¹ ʶҹ¡Òóìà´ÕÂǡѹ¹Õé ä»ãªé¡Ñº¡ÒúÃÔËÒèѴ¡ÒÃÅÙ¡¤éÒ㹡Ò÷ӸØáÃÃÁ ´éÒ¹¡ÒÃà§Ô¹¼èÒ¹ÃкºÍ͹äŹì àªè¹ Ãкº¸¹Ò¤ÒÃÍ͹äÅ¹ì ¹Í¡à˹×ͨҡ ¡Òû¯ÔºÑµÔµÒÁ¡®ÃÐàºÕº ÅÙ¡¤éÒ·ÕèãªéÃкºÍ͹äŹì¢Í§¸¹Ò¤ÒÃÍÒ¨¨Ðµéͧ¡Òà à»ÅÕè¹¾ÒÊàÇÔÃ촢ͧµÑÇàͧ·Ø¡æ à´×͹ «Ö觨СÅÒÂà»ç¹½Ñ¹ÃéÒ ¶éÒ¡ÒÃ¢Í à»ÅÕè¹¾ÒÊàÇÔÃì´äÁè ä´é¶Ù¡¨Ñ´¡ÒüèÒ¹ÃкºÍѵâ¹ÁÑµÔ Í§¤ì¡Ã¸ØáԨ¨Ö§¨Óà»ç¹ µéͧÁÕÃкº¡ÒúÃÔËÒèѴ¡ÒôéÒ¹¤ÇÒÁ»ÅÍ´ÀÑ Identity and Access Management «Öè§à»ç¹ÃкºÍѵâ¹ÁÑµÔ ã¹¢³Ð·ÕèÂѧÃÑ¡ÉÒ¤§¤ÇÒÁ»ÅÍ´ÀÑÂäÇé´éÇÂ


Higher Costs Than Ever…

ºÃÔ¡ÒâͧàÃÒ • ºÃÔ¡ÒÃãËé¤Ó»ÃÖ¡ÉÒáÅÐÍ͡ẺÃкº Identity and Access Management ÇÔà¤ÃÒÐËìÃкº§Ò¹ áÅÐâ¤Ã§ÊÃéÒ§¾×é¹°Ò¹Ãкº¤ÇÒÁ»ÅÍ´ÀÑ ÊÒÃʹà·È¢Í§Í§¤ì¡Ã • µÔ´µÑé§Ãкº Identity and Access Management à¾×èÍàª×èÍÁµèÍÃкº §Ò¹µèÒ§æ ÃÇÁ·Ñ駴Óà¹Ô¹¡ÒÃÍ͡Ẻ Workflow áÅÐ Role Base ãËéà»ç¹ä» µÒÁ¤ÇÒÁàËÁÒÐÊÁ¡ÑºáµèÅÐͧ¤ì¡Ã

¶Ö§áÁŒÇ‹Ò Ãкº¡ÒúÃÔËÒèѴ¡ÒôŒÒ¹¤ÇÒÁ»ÅÍ´ÀÑ Identity and Access Management ໚¹à¾Õ§ᤋ¡ÒþѲ¹Ò¡Ãкǹ¡ÒÃÀÒÂã¹Í§¤¡Ã ᵋäÁ‹ä´ŒãËŒ ¼Å¡ÓäÃâ´ÂµÃ§¡Ñº¼Å»ÃСͺ¡Òâͧͧ¤¡Ã ᵋÃкº¨Ð໚¹µÑǪ‹ÇÂã¹·Ò§ ˹Öè§ ã¹¡ÒÃÅ´¤‹Ò㪌¨‹ÒÂ㹡ÒúÃÔËÒèѴ¡ÒâŒÍÁÙżŒÙ㪌 áÅÐà¾ÔèÁ»ÃÐÊÔ·¸ÔÀÒ¾ 㹡Ò÷ӧҹáÅÐÊÌҧ¼Å¡ÓäÃᡋͧ¤¡Ãã¹·ÕèÊØ´ ¨Ò¡¡ÒÃÇÔà¤ÃÒÐˢͧ ºÃÔÉÑ·¡ÒõÅÒ´´ŒÒ¹à·¤â¹âÅÂÕÃÒ§ҹNjҡÒÃÁÕÃкº´Ñ§¡Å‹ÒÇ ÊÒÁÒöª‹Ç ·ÓãËŒ¤‹Ò㪌¨‹ÒÂà¡ÕèÂǡѺ¡ÒúÃÔËÒèѴ¡ÒÃŴŧ ÁÕÍѵÃÒÊÙ§¶Ö§ 78 à»ÍÃà«ç¹µì

• Ãкº Directory Services (LDAP) • Ãкº Identity Management (User Life Cycle Management) • Ãкº Web Single Sign-On • Ãкº Single Sign-On (ÊÓËÃѺá;¾ÅÔपÑè¹ ·Õèà»ç¹ Client-Server, AS-400) • Ãкº Authorized Certificate (CA Server)

¢ŒÍ´ÕáÅлÃÐ⪹·Õèä´ŒÃѺ

Ãкº¡ÒúÃÔËÒèѴ¡ÒôŒÒ¹¤ÇÒÁ»ÅÍ´ÀÑ Identity and Access Management ¤ÇèÐÁÕʋǹ»ÃСͺËÅÑ¡æ ÍÒ·Ô Ãкº¤Çº¤ØÁ¡ÒÃࢌҶ֧ ¢ŒÍÁÙÅ (ઋ¹ ÍÓ¹Ò¨¢Í§¼ŒÙ㪌§Ò¹), ¡ÒúÃÔËÒèѴ¡ÒÃÅѡɳÐ੾ÒеÑÇ (ઋ¹ ¡ÒÃÊÌҧáÅÐź¢ŒÍÁÙŢͧ¼ŒÙ㪌áͤà¤Ò·) áÅÐÃкººÃÔ¡ÒèѴËÁÇ´ËÁ‹Ù (ઋ¹ ¨Ñ´µÓá˹‹§ãËÁ‹ÊÓËÃѺ¡ÒèѴà¡çº¢ŒÍÁÙŢͧ¼ŒÙ㪌 ͧ¤¡Ã¸ØáԨ¨Ó໚¹ ¨ÐµŒÍ§ÁÕ¤ÇÒÁÅÐàÍÕ´àÅ×͡㪌Ãкº¡ÒúÃÔËÒèѴ¡ÒôŒÒ¹¤ÇÒÁ»ÅÍ´ÀÑ Identity and Access Management ãËŒ¶Ù¡µŒÍ§àËÁÒÐÊÁáÅÐÃͧÃѺ¡Ñº ¸ØáԨ¢Í§Í§¤¡Ã ÁÔઋ¹¹Ñ鹨СÅÒÂ໚¹¡ÒÃà¾ÔèÁ¤‹Ò㪌¨‹ÒÂãËŒ¡ÑºÍ§¤¡Ã â´ÂËÅÑ¡ãË−‹æ ¢Í§Ãкº Identity and Access Management ¨Ð »ÃСͺ´ŒÇÂʋǹÊÓ¤Ñ−´Ñ§µ‹Í仹Õé • Identity Administration User Management Managing User Profiles & Assets Role Management Managing User Roles & Entitlements • Access Management Authentication Verifying User Access Control Controlling User Access Rights Single Sign-On Reduce User Credentials & Authentications • Directory Services Enterprise Directory Storing Identity Information 



 





«Öè§ã¹áµ‹ÅÐʋǹ¢ŒÒ§µŒ¹ ¼ŒÙ Implement ÃкºµŒÍ§à¢ŒÒã¨áÅÐÍ͡Ẻ໚¹Í‹ҧ´Õ ÃÇÁ¶Ö§¡ÒÃàÅ×Í¡«Í¿µáÇ÷Õè㪌ºÃÔËÒèѴ¡ÒÃÃкº·ÕèÁÕ»ÃÐÊÔ·¸ÔÀÒ¾ÊÙ§ â´Â ·Ò§àÃÒàÅ×͡㪌¼ÅÔµÀѳ±«Í¿µáÇúÃÔËÒèѴ¡ÒÃÃкº Identity and Access Management ·ÕèÁÕ»ÃÐÊÔ·¸ÔÀÒ¾ÊÙ§ ÁÕª×èÍàÊÕ§ áÅÐÍ‹Ùã¹ÃдѺ á¹Ç˹ŒÒ ¡ÒèѴ¡ÒâéÍÁÙÅà¾×èÍáÊ´§µÑǵ¹¹ÑºÇèÒÁÕ»ÃÐ⪹ìÍÂèÒ§ÁÒ¡ à¾ÃÒШÐà»Ô´ âÍ¡ÒÊãËéͧ¤ì¡ÃÊÒÁÒöŴ¤ÇÒÁàÊÕè§ã¹àÃ×èͧ¡ÒééÍ⡧áÅСÒÃâ¨Ã¡ÃÃÁ ·Ñé§ÂѧªèÇÂÅ´¤èÒãªé¨èÒ »ÃѺ»Ãا¡ÒôÓà¹Ô¹¸ØáԨ áÅÐÃͧÃѺ¡Ò÷ӧҹ ÃèÇÁ¡Ñ¹ÍÂèÒ§»ÅÍ´ÀÑÂÃÐËÇèÒ§½èÒµèÒ§æ ·ÕèÁÕÊèǹà¡ÕèÂÇ¢éͧ â´Âà»ç¹ä»µÒÁ ¡®ÃÐàºÕºáÅТéÍ¡Ó˹´·ÕèÁռźѧ¤Ñºãªé (GRC: Governance, Risk Management and Regulatory Compliance) »Ñ¨¨ØºÑ¹¡®ÃÐàºÕºÃÐËÇèÒ§ »ÃÐà·Èà¢éÁ§Ç´ÁÒ¡¢Öé¹ã¹àÃ×èͧ¢Í§¡ÒõÃǨÊͺ àªè¹ ¡®ËÁÒ SarbanesOxley (SOX), HIPPA, PCI ·ÓãËéºÃÔÉÑ·µèÒ§æ µéͧ·Ó¡ÒõÃǨÊͺ ÍÂèÒ§ÅÐàÍÕ´¶Õè¶Çé ¹ ÁÕ report µèÒ§ æ à¾×èÍ»éͧ¡Ñ¹äÁèãËé¼Ùéãªé¹ÓàÍÒµÑǵ¹ ´Ô¨ÔµÍÅ·Õèä´éÃѺ¨Ò¡ºÃÔÉÑ·ä»ãªéã¹·Ò§·Õè¼Ô´ áÅÐà¾×èÍãËéá¹èã¨ÇèҺѹ·Ö¡¢éÍÁÙÅ µèÒ§æ ä´éÃѺ¡ÒûÃѺ»ÃاãËé·Ñ¹ÊÁÑÂ

• Reduce Cost & Help Desk Operations Å´¤‹Ò㪌¨‹ÒÂ㹡ÒúÃÔËÒà ¨Ñ´¡ÒâŒÍÁÙżŒÙ㪌 ´ŒÇÂÃкººÃÔËÒèѴ¡Òèҡʋǹ¡ÅÒ§áÅмŒÙ㪌ÊÒÁÒö ¨Ñ´¡ÒâŒÍÁÙÅËÃ×Íà»ÅÕè¹ÃËÑʼ‹Ò¹ä´Œ´ŒÇµÑÇàͧ • Centralized Management ÁÕÃкººÃÔËÒèѴ¡ÒâŒÍÁÙżŒÙ㪌¨Ò¡Ê‹Ç¹¡ÅÒ§ ·ÕèÊÒÁÒö¨Ñ´¡ÒâŒÍÁÙÅã¹·Ø¡á;¾ÅÔपÑè¹ áÅÐÊÒÁÒö¡Ó˹´ Policy µ‹Ò§æ ÃÇÁ·Ñé§ Access Control áÅÐ Rules ÊÓËÃѺá;¾ÅÔपÑè¹µ‹Ò§æ ä´Œ¨Ò¡Ê‹Ç¹¡ÅÒ§ • Role Base Access Control & Workflow Efficiency ÁÕÃкº §Ò¹·Õè໚¹ Workflow áÅÐ Automatic Task ·ÕèÊÒÁÒö¡Ó˹´ãËŒ·Ó§Ò¹ä´Œ µÒÁ Business Process ¢Í§áµ‹ÅÐͧ¤¡ÃáÅÐÊÒÁÒö¡Ó˹´ÊÔ·¸Ôì¡ÒÃ㪌§Ò¹ Ẻ Role Base Access Control áÅÐ Rules ÊÓËÃѺá;¾ÅÔपÑè¹µ‹Ò§æ • Increase Enterprise Security ÁÕ Directory ¡ÅÒ§·Õè·Ø¡á;¾ÅÔपÑè¹ ÊÒÁÒöàÃÕ¡㪌ÊÓËÃѺ¡Òà Authentication áÅÐÊÒÁÒö¡Ó˹´ Policy µ‹Ò§æ ÃÇÁ·Ñé§ Access Control áÅÐ Rules ÊÓËÃѺá;¾ÅÔपÑè¹µ‹Ò§æ ä´Œ¨Ò¡ Directory ¡ÅÒ§ áÅÐ Web Single Sign-On • Efficiency in Application Development (LDAP Enabled Application) ÊÒÁÒö¾Ñ²¹ÒÃкº§Ò¹ËÃ×Íá;¾ÅÔपÑè¹ãËÁ‹æ ·ÕèÊдǡÃÇ´àÃçÇ¡Ç‹Òà´ÔÁ à¾ÃÒÐ㪌°Ò¹¢ŒÍÁÙżŒÙ㪌§Ò¹Ãкº¨Ò¡ Directory ¡ÅÒ§ áÅÐ Web Single Sign-On • Online Password Reset & User Self Services ÁÕ Web Interface ·Õ輌Ù㪌§Ò¹ËÃ×ͼŒÙ´ÙáÅÃкºÊÒÁÒöà»ÅÕè¹ÃËÑʼ‹Ò¹ËÃ×Íᡌ䢌ÍÁÙÅʋǹµÑÇ áºº Online áÅŒÇ Update ä»·Ø¡Ãкº·Õèà¡ÕèÂÇ¢ŒÍ§â´ÂÍѵâ¹ÁÑµÔ • Support for Regulatory Requirements ÁÕà¤Ã×èͧÁ×Í㹡ÒÃà¡çº Log áÅÐ Audit Reports 㹡ÒÃᡌ䢢ŒÍÁÙżŒÙ㪌 áÅÐ Log ¡ÒÃࢌÒÊ‹ÙÃкº§Ò¹ µ‹Ò§æ ¼‹Ò¹ Directory Authentication áÅÐ Web Single Sign-On

G-ABLE Call Center

Tel. : +66(0) 2685 9333 Email : callcenter@g-able.com



Indentity and Access Management Solutions Brochure