https://store-images.s-microsoft.com/image/apps.51771.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.edf80122-1d1a-43c5-912c-93abdf0a48f7

Protect Your Workplace - Aurora - Cloud based IAM

Core Technology Systems (UK) Limited
Core's identity solution helps take control of who can access systems and network.
https://store-images.s-microsoft.com/image/apps.7295.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.75bb75ce-943b-4889-8882-3dbf7ffdb907
https://store-images.s-microsoft.com/image/apps.7295.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.75bb75ce-943b-4889-8882-3dbf7ffdb907
https://store-images.s-microsoft.com/image/apps.31349.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.19577275-cbbc-4325-a168-49247d6282dc

Protect Your Workplace - Aurora - Cloud based IAM

Core Technology Systems (UK) Limited

Core's identity solution helps take control of who can access systems and network.

With modern businesses running so many electronic systems, keeping track of who can access them, how, and from where, can feel like a never-ending task. Our Identity and Access Management solution, Aurora, is designed to take control of all your systems and users, and ensure everyone gets the access they need. Key to this is providing such access without leaving holes for unauthorised personnel – be they hackers, or simply people who have left the company and moved on. Running as part of our Managed Service portfolio, this solution combines the power of a host of modern technology, including ADFS, Azure AD and Active Directory Health Check. It uses a principle of Role Based Access Control (RBAC) and can be configured to your company’s precise requirements. Key Features and Benefits Custom Branding and Scripting Aurora can be custom branded for your organisation, and processes for identifying users, authenticating them and providing them system access are highly configurable. We consider the full “lifecycle” of a user, including planning for how to withdraw access when personnel leave. Provisioning and Integration It’s possible to configure Aurora to automatically provision new users for the system, either via integration with Active Directory, or by linking into external HR systems. Once within the system, users can perform their own “self service” password resets, and administrators have access to portals to grant access to additional systems and groups. An extensive range of reports is available from the point of installation, allowing you to easily monitor and verify how systems are being accessed and used. A Choice of Authentication Methods Secure authentication to IT systems often involves more than just passwords. As well as offering secure web-based access from any browser on any device, the system supports secure two-factor authentication using both hard and soft tokens. Workflow As well as policies, Aurora IDAM also provides a rich workflow system for directory data management automation and integration. Based on Microsoft’s Windows Workflow Foundation technology, this workflow system enables IT to define, automate and enforce management rules, approvals and notifications quickly and easily. Security Aurora will provide a single portal into the source identity vault, allowing you to reduce or even remove entirely the number of accounts that have Administrator access privilege, limiting the number of attack vectors into your main identity database.
https://store-images.s-microsoft.com/image/apps.7295.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.75bb75ce-943b-4889-8882-3dbf7ffdb907
https://store-images.s-microsoft.com/image/apps.7295.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.75bb75ce-943b-4889-8882-3dbf7ffdb907
https://store-images.s-microsoft.com/image/apps.31349.e6fd1287-eaca-4c3c-8bba-2602d1cedde1.11015bed-9d0e-46bf-b78c-42aecf84cbb7.19577275-cbbc-4325-a168-49247d6282dc