Login to your account

Username *
Password *

Propentus United Identity

Propentus United Identity collects, manages and utilizes identity master data intelligently. It helps you connect people, things, information, devices, applications and business processes, securing access to the right resources regardless of time, place or device used.

  • Ikoni
  • Benefits

    • Organization-wide transparency is increased when the digital identity of all people and things is managed on a centralized basis. A unified operating model simplifies identity life cycle management.
    • Data security is improved and risk management is made easier when the integrity and up-to-datedness of identity master data is secured by a centralized data repository. Any changes to the status of an identity are reflected in the respective access rights and immediately forwarded to all necessary target systems.
    • The automation of routine tasks reduces the workload and costs of the IT department and the helpdesk as well as the creation of insufficient or incorrect access rights.
    • Real-time information and reporting on users, access rights and those who granted them improves the data security of your organization.

     

Identity Management

Manage the digital identities of people and equipment on a centralized basis and utilize the related master data to boost and automate your business processes.

Read more...
  • Ikoni
  • Benefits

    • User experience is enhanced and work productivity increased when people are assigned the correct access rights at the correct time.
    • Real-time information and reporting on users, access rights and those who granted them increases transparency and improves the data security of your organization.
    • Data security is also enhanced by the fact that information about any changes to the access rights is immediately forwarded to the target systems concerned and that any access rights currently in force will be automatically deleted upon termination of employment or cooperation.
    • The automation of routine tasks reduces the workload of the IT department and the helpdesk as well as the creation of insufficient or incorrect access rights.

     

Access Right Management

Make sure that your employees, partners and customers have the tools they need at their disposal for the right reasons and at a right time.

Read more...
  • Ikoni
  • Benefits

    • The employment contract practices in different sections and departments are unified, and the electronic management of employment contracts can be combined with quick and easy access rights management.
    • Any changes to the employment contract and employment relationships can be quickly reflected in access rights management.
    • Using employment data to automate the access rights management process ensures that the individual concerned will only be granted access rights that are consistent with his or her job description. The accelerated process makes it possible for even temporary employees to start working immediately.
    • This streamlines the life-cycle management of identity data and ensures that the correct information is available at all times.
    • The automation of routine tasks reduces the workload of the IT department and the helpdesk as well as the creation of insufficient or incorrect access rights.
    • Real-time information and reporting on access rights, users and those who granted the access rights improves the data security of your organization.

Job Agreement Management

Automate your access rights management process with employment data so that access rights take effect immediately as soon as a new employment contract is created.

Read more...
  • Ikoni
  • Benefits

    • People are provided with the tools they need and access to the right resources and sites quickly, flexibly and in a controlled manner.
    • Contractual relationships control the access rights management process.
    • Upon termination of cooperation, the access rights of the individual concerned are automatically deleted.
    • This streamlines the life-cycle management of identity data and ensures that the correct and up-to-date information is available at all times.
    • The automation of routine tasks reduces the workload of the IT department and the helpdesk as well as the creation of insufficient or incorrect access rights.

     

Stakeholder management

Manage personal and contract information of external employees, partners and customers in a centralized manner and secure them easy access to your organization's resources and services quickly, flexibly and in a controlled manner. 

Read more...
  • Ikoni
  • Benefits

    • Key and access control is integrated as part of the organization-wide centralized identity and access rights management system. The key and access control systems currently in use in your organization can be integrated as part of a centralized whole.
    • The process of granting physical access is simplified and streamlined with the centralization of data and the automation it enables. Information about any changes to users’ rights is automatically forwarded to the target system concerned.
    • When the period of validity of the access rights expires, the deletion process automatically begins. This is to ensure that no unnecessary access rights remain in effect when the individual concerned leaves the organization. The access rights can be deleted immediately in the event of danger.
    • The centralized register makes up-to-date information about all keys and access permits to your organization available at all times, i.e. who has access and where, who has granted the access rights and on what grounds. This enhances the security of your organization and supports compliance.

     

Key and Access Control

Enables centralized control of employee, partner and visitor access to your organization’s facilities and other sites.

Read more...
  • Ikoni
  • Benefits

    • A centralized and up-to-date record of current, pending and expired access rights enhances data security and supports risk management.
    • A consistent process for requesting, approving and deploying access rights facilitates compliance.
    • The log data on granting or revoking access rights and on any changes made to them recorded in a centralized data repository ensure complete traceability of operations.
    • Comprehensive reporting and audit functionalities make internal and external audits easier and faster to carry out.

     

Governance and Reporting

Ensure compliance with regulations and auditing standards in real time and succeed in audits.

Read more...

Let's talk

Do you want to hear more or see a demo? Contact our IAM experts or request a call.
Let's meet to discuss how your organisation would benefit from Propentus United Identity.
This email address is being protected from spambots. You need JavaScript enabled to view it. +358 (0)10 321 3152