Access Management

IS4U has defined, based on our proven methodology, the best approach to a full IAM project.

The different steps include:

  • High level security audit
  • Problem definition / Root-cause analysis
  • Definition of the AS-IS situation
  • Product choice / Definition of TO-BE
  • Product Implementation / BPR and ITPR
  • Awareness training / Acceptation

Some of these steps might already have been finished before IS4U gets involved and can be skipped. IS4U will, together with the client, define upfront what steps need to be taken to get to a successful implementation.

Our Partners