https://store-images.s-microsoft.com/image/apps.23009.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.71bebbb7-6d37-4d1c-a2d7-3d71dcddda89

CAP2AM - Identity and Access Management

Iteris Consultoria e Software Ltda

Identity & Access Management - Streamline user identity management, provisioning and access requests

Your Fastest IG&A Adoption and  process.

Cap2AM is an IG&A (Identity Governance and Administration) solution that establishes an integrated and effective task flow among the main corporate systems and resources, allowing organizations to have a comprehensive synergy among governance, usability, integration and auditing.


Top 5 challenges covered by CAP2AM

How our alignment with trends in the IG&A scenario is supporting our customers?

As technology continues to bring more users, applications and data together, these connections also bring more security needs. Identity governance & administration is the easiest way to implement your digital transformation faster and reduce risk.

  • Identity & Provisioning (AD, Office 365 & licencing)
  • Access Requests (Self-service catalog)
  • Access Certification (Governance)
  • Password Mgmt
  • SoD Matrix

AD & Office 365 Provisioning

CAP2AM will help you to avoid excess permissions by automatically adjusting and removing user access as change happens, helping reduce risk while improving your compliance and productivity.

Identity sources: ADP, Apdata, Senior, SAP, Oracle, LG, Totvs etc

Automatically provisioning: Active Directory, Office 365, Google Workspace (G Suite), Exchange on-premises etc


Automate Identity Lifecycle Administration

Automate all lifecycles with any access type for external or internal users.

Hands off real-time user provisioning triggered by your preferred HR system including ADP, Apdata, Senior, SAP, Oracle, LG, Totvs etc

Integration to Active Directory including extended rich profiles, group push, and license and role assignment all in a single and centralized point.


Self-service Access Requests

Whenever a user needs access to a new application or corporate resource, they can go to the catalog where applications are listed.

By starting a request access, they are automatically provisioned — or, if needed, routed to their manager to approve the request.


Access Certification

Never trust, always verify.

Users take on different roles, take on new responsibilities and use more applications and data to do their jobs. To keep your organization safe – and ready for auditing – it is critical to ensure that access remains appropriate for all users.

CAP2AM automates user access reviews and reporting, making it easy for your business team to manage approvals.


概要
https://store-images.s-microsoft.com/image/apps.52247.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.e464f97d-a67a-4372-b0bb-4c62f4f809a4
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.12812.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.07057cef-8bff-4600-8054-a7097fed67ec
https://store-images.s-microsoft.com/image/apps.37638.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.f120c871-7b72-4f07-adf4-74f080e51845
https://store-images.s-microsoft.com/image/apps.11527.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.958ce76a-26ee-4862-86e8-5bf9132efbba
https://store-images.s-microsoft.com/image/apps.39450.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.d2c191a5-8127-40d8-a46f-e3bce0d71b59
https://store-images.s-microsoft.com/image/apps.58479.e1ab15bc-73d5-4faf-afaa-cb3201fc55ed.54570a9a-6cef-46b2-ad47-4eef29817b30.5f2474a9-94e3-4f6a-b026-95b330327693