AMP!: Revolutionizing Identity Management
When it comes to installing or enhancing identity management systems, we all think of the same challenges:
-Major investments in people and technology
-Time consuming processes
-Disruptions to legacy systems and operations
The good news is that it doesn't have to be that way any longer. Introducing AMP!, an application developed by The SCE Group that takes everything you have thought about identity management and makes it better, faster, simpler.
AMP! enables the enterprise to quickly and economically deploy a self-service platform, permitting specific system and application access to specified employees, vendors and partners, while simultaneously restricting them from gaining access to sensitive and/or proprietary enterprise level information.
AMP! is designed to be a self-service portal for internal directory administrators and authorized external users. The advantages include:
- Enables management to create profiles for different types of user accounts
- Allows authorized users to manage their own credentials (creating, resetting passwords or changing information)
- Invites external users to work on projects for specified periods of time
- Carries little or no overhead for administration of new or existing users
- Facilitates a simplified on-boarding process in a tightly controlled environment
Business units can now enable users to work AT THE SPEED OF NOW!
Integration Enablement Kit: Bullet-Proof Identity Protection
For every enterprise, sophisticated identity protection that poses a bullet-proof challenge to all unauthorized users is always the goal/the universal need!
However, organizations often lag behind this security curve and need to enhance their defenses. The challenges they face is that weak, single-step security is often costly and complex to update and replace with state-of-the-art systems. That's why SCE set out to change that.
The SCE Group's Integration Enablement Kit is designed specifically to provide your enterprise with the ability to integrate RSA's Adaptive Authentication with your current identity and access management platforms. Using this seamless and cost-effective approach, you can protect resources behind a virtual identity fortress, using both visible and invisible authentication methods. Based on your organization's security and profiling preferences, users must first pass through initial authentication, followed by a series of step-up challenges, depending on their risk profiles and enterprise protocols.
Supported integration points include:
- Ping Federate
- F5 APM
- Microsoft ADFS
- Citrix NetScaler
- Citrix Storefron/Worx
- CA SiteMinder
- Microsoft Forefront Identity Manager
- Microsoft UAG
- Juniper IVE
- Cisco ASA (Web SSL-VPN Only)
- Tivoli Access Manager/iSam
- NetIQ/Novell Access Manager
- RSA Access Manager
Contact Us >