Partner details

Aveksa     Aveksa
180 Picadilly • W1J 9HF London
Phone: +44(0)20 7917 9466
E-Mail: [email protected]
Internet: http://www.aveksa.com

Aveksa was founded by a team of identity and access management pioneers, whose successful track records include Netegrity, Banyan Systems and PowerSoft. They recognized that businesses are struggling to achieve security governance across the enterprise, and are unable to efficiently or effectively manage the risk of inappropriate access to enterprise information resources.

From the time of our founding, we’ve focused on helping security teams and business managers collaborate on these objectives, through the automation of the many critical, yet manual tasks associated with access delivery, change management and compliance across the entire enterprise. We believe that in order to rapidly respond to business and regulatory demands, IT security organizations need an Enterprise Access Governance solution, to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation.

We provide the industry's most comprehensive, enterprise-class, access governance and management solution, helping IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.

Since 2006, when we released the first version of our product, we’ve been working hard to make our vision a reality. Our Enterprise Access Governance solutions are distinct in the following ways:

  • We make line-of-business managers key participants in access governance
  • We support ALL enterprise entitlements and roles; and enable role-based governance
  • We provide reports, certifications and analytics that are easily understood by business users
  • We enable and track entitlement changes
  • Our solutions are designed for fast deployment and massive scale
  • We embrace, complement and integrate with identity management and change management systems
  • Aveksa's growing customer base includes leading organizations in financial services, health care and manufacturing. Our customers tell us that “we get it.” We think you will too

Sponsored events

Congress: European Identity & Cloud Conference 2012 17.04. - 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Congress: European Identity Conference 2010 04.05. - 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Congress: CLOUD 2010 04.05. - 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.


Congress: Mittelstandsdialog Informationssicherheit 04.05. - 07.05.2010 , M�nchen
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.


Webinar: Access Governance: Implement Processes, Reduce Business Risks 15.04.2010 , 17:00-18:00 CET, 11am Eastern
As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements.


Congress: European Identity Conference 2009 05.05. - 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Webinar: Cutting Costs through Lean Role Management 29.01.2009 , 17:00 CET, 4pm UTC
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.


Webinar: Enterprise Role Management 04.12.2008 , 17:00 - 18:30 CET (08:00am PT, 16:00 UTC
Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.


Reports

Product Report: Aveksa Enterprise Access Governance Platform 26.04.2010 Martin Kuppinger €95.00
The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without technical integration. This is a significant step forward beyond the detective approach which was at the centre of the earlier product version. Besides this, there are significant improvements around rules, role mining, and other important product features. Aveksa has implemented these changes based on extensive feedback by their customers. From our perspective, Aveksa has achieved a new level of maturity with its 4.0 release. We rate the platform amongst the leading-edge tools in the Access Governance market, despite some shortcomings around risk management and integration. Customers who are evaluating Access Governance tools should include the Aveksa 4.0 Enterprise Access Governance Platform.

Order the report

Podcasts

Access Governance: Implement Processes, Reduce Business Risks 17.04.2010
As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements. Watch
Cutting Costs through Lean Role Management 30.01.2009
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives. Watch

© 2012 KuppingerCole