Partner details
![]() |
Aveksa
180 Picadilly • W1J 9HF London Phone: +44(0)20 7917 9466 E-Mail: [email protected] Internet: http://www.aveksa.com Aveksa was founded by a team of identity and access management pioneers, whose successful track records include Netegrity, Banyan Systems and PowerSoft. They recognized that businesses are struggling to achieve security governance across the enterprise, and are unable to efficiently or effectively manage the risk of inappropriate access to enterprise information resources. From the time of our founding, we’ve focused on helping security teams and business managers collaborate on these objectives, through the automation of the many critical, yet manual tasks associated with access delivery, change management and compliance across the entire enterprise. We believe that in order to rapidly respond to business and regulatory demands, IT security organizations need an Enterprise Access Governance solution, to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation. We provide the industry's most comprehensive, enterprise-class, access governance and management solution, helping IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands. Since 2006, when we released the first version of our product, we’ve been working hard to make our vision a reality. Our Enterprise Access Governance solutions are distinct in the following ways:
|
Sponsored events
- Congress: European Identity & Cloud Conference 2012 17.04. - 20.04.2012 , Munich, Germany
- With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
- Congress: European Identity Conference 2010 04.05. - 07.05.2010 , Munich
- With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
- Congress: CLOUD 2010 04.05. - 07.05.2010 , Munich
- Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.
- Congress: Mittelstandsdialog Informationssicherheit 04.05. - 07.05.2010 , M�nchen
- Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
- Webinar: Access Governance: Implement Processes, Reduce Business Risks 15.04.2010 , 17:00-18:00 CET, 11am Eastern
- As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements.
- Congress: European Identity Conference 2009 05.05. - 08.05.2009 , Munich
- With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
- Webinar: Cutting Costs through Lean Role Management 29.01.2009 , 17:00 CET, 4pm UTC
- In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.
- Webinar: Enterprise Role Management 04.12.2008 , 17:00 - 18:30 CET (08:00am PT, 16:00 UTC
- Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.
Reports
- Product Report: Aveksa Enterprise Access Governance Platform 26.04.2010 €95.00
-
The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without technical integration. This is a significant step forward beyond the detective approach which was at the centre of the earlier product version. Besides this, there are significant improvements around rules, role mining, and other important product features. Aveksa has implemented these changes based on extensive feedback by their customers. From our perspective, Aveksa has achieved a new level of maturity with its 4.0 release. We rate the platform amongst the leading-edge tools in the Access Governance market, despite some shortcomings around risk management and integration. Customers who are evaluating Access Governance tools should include the Aveksa 4.0 Enterprise Access Governance Platform.
Order the report
Podcasts
- Access Governance: Implement Processes, Reduce Business Risks 17.04.2010
- As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements. Watch
- Cutting Costs through Lean Role Management 30.01.2009
- In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives. Watch

