IAM - the cornerstone of security

Successful IAM not only secures access to data and systems, but also forms the backbone of an effective and sustainable security strategy.

Contact us

> 7'500

Consulting days

> 100

Successful mandates

Your IAM Consulting Team

You can count on our IAM consulting expertise for site assessment, conception, architecture, governance, product evaluation or further development.
Successful projects in the field of Identity and Access Management (IAM) are characterized by well thought-out target definitions, suitable conceptual foundations and realistic implementation packages. Analysis, conception, planning and management of IAM projects are among our core competencies as experienced consultants. Our advice is always product-neutral - we help you to find the most suitable solution for your organization. We support you with tailor-made solutions that we can offer you thanks to our many years of experience in the implementation of IAM projects and the use of proven methods and concepts.

IAM reference model

IAM architecture

IAM principles and policies

IAM concept

IAM processes

IAM market overview

Your added value
Independent location determination
Through a professional and external IAM assessment, we identify optimization potential and create targeted, realistic recommendations for improving your IAM. Thanks to our many years of experience and practical approaches, we know the stumbling blocks and success factors.
A holistic view that goes beyond technology
Technology alone is not enough. Processes, internal guidelines, a suitable concept and clear responsibilities are crucial for successful IAM, because IAM affects all employees and departments. We help you to develop a long-term and sustainable strategy to make your IAM efficient and future-proof.
From the idea to the launch
We support you in the selection of suitable suppliers and products or in the optimization of your existing systems. With our expertise, we ensure that the conceptual foundations are put into practice. From the analysis to the successful introduction of your IAM, we are at your side as a reliable partner.
IAM as an important cornerstone of security

Central governance

Ensuring central governance for identities, authorizations, accounts and credentials with regulated and consistent processes such as user lifecycle management.

Transparency and traceability

Ensuring transparency and traceability with regard to identities, accounts and their authorizations to ensure the ability to provide information and analysis.

Flexibility and future viability

Ensuring optimal time-to-market (use of new services, including in the cloud), flexibility and future viability through the implementation of customized concepts based on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Risk-Based Authentication, Anomaly Detection, Identity Risk Management, Bring-Your-Own-Identity (BYOID), Inbound and Outbound Federation.

Cost efficiency

Ensure cost savings through efficient management of identities, authorizations, accounts and credentials thanks to automation and the avoidance of functional redundancies and complex architectures.

We are here for you!

Contact us today to find out how our IAM experts can support you and your company.

Adrian Bachmann

Adrian Bachmann - Ihr Ansprechpartner für IAM

What our experts say

Teaser Image
01.12.2021| Thomas Kessler | Article

The Dark Side of Collaboration Platforms

Read article
Teaser Image
12.10.2021| Alex Rhomberg et al. | Presentation

Access management turned around

Read article
Teaser Image
29.06.2021| Thomas Bühler | Article

Modern Authentication - Token Exchange

Read article
To all contributions