Authentication examines if a person / an object really is what he/she claims to be. Normally you can find authentication when it comes to knowledge (username, password, ownership token, one time passwords, certificates) or biometric identifiers (fingerprint, face recognition).

Identity Management

The IAM is a central security concept which makes all administrative tasks structured and comprehensible and avoids unintentional active user accounts, reduces the possible sources of errors at the administration and recognizes identity theft. IAM is suitable for the access from employees to company resources; through new functions such as privileged access management and shared password management the security level can be raised further.

Which manufacturer offers which IT security solution?

We have created a detailed matrix of our solutions from the Infinigate portfolio. With this matrix you can see at a glance which manufacturer offers which IT security solutions.