
After several attempts to implement a central access management were met with limited success, Julius Bär decided to take an unconventional approach and implement a custom solution that ignores some common notions of how an IAM system must look like. Getting business on board, reducing the tasks of the central implementation team and leveraging the knowledge and manpower of the application teams whose access rights are controlled by the IAM system enabled bringing applications and access rights to the new IAM system in an unprecedented speed, with more than 800 applications with 1000s of access rights and dozens of custom connectors being onboarded in the space of just two years.
Click play to load and play the video from Youtube.
I am an experienced security architect and cybersecurity expert. My focus is on Identity and Access Management and Privileged Access Management, especially in complex organizations where clean processes and the embedding of new solutions into the existing environment are crucial for success. To keep myself technically up to date, I program our internal applications using the latest technology.