Big data / Security > DS Mentoring Chakan IDM/SAC

[ DS Mentoring Chakan IDM ]

Introduction

Big Data Platform-integrated Account Management and Security Access Control Solution
Chakan IDM system is a solution which supports safe authentication and authority management service through the connection of EAM and SSO system and the system provides managing functions such as integrated account management, resource account management, approval system, account distribution and synchronization to run corporate account management infrastructure effectively and efficiently. Chakan IDM solution minimizes the costs in corporate system and user’s account management. Further, the solution improves user convenience and enhances internal security to maximize corporate profits because it blocks the arbitrary access to corporate assets and prevents leakage.

Characteristics



Account Management through Centralized Control
* Reinforcing business performance efficiency, resulted in providing the account management service in the form of centralized management
* Maintaining and managing the latest user account information through user account distribution and synchronization

Enterprise Account and PIN number policies
* Providing consistent management by supporting enterprise account and PIN number policies in creating accounts.
* Aiding the encryption of PIN number with the support of encrypted algorithm
* Reinforcing security level and improving security level

[ DS Mentoring Chakan SAC ]

Introduction

Chakan SAC system supports to find fault causes and recover them by providing real-time monitoring and detecting functions including various protocols (Telnet, FTP, SSH, SFTP and RDP, etc.) to minimize system malfunctions when users access to external system resources (whether it is malicious or accidental). In addition, when the system connected with the integrated account management system of our company (Chakan IDM), it minimizes the costs in system account management, improves user convenience and reinforces internal security to provide the effect on the prevention in the arbitrary access to important assets and their leakage.

Characteristics



User Management
* Supporting user registration, change, and deletion, based on self -service
* Supporting request and approval schemes for user account management and task-based resource allocation
* Aiding complex authentication and user authentication based on ID/Password, OTP and PKI

Controlling Commands, Directories and Files
* Controlling commands, directories and files in the form of Black List and White List
* Supporting real-time control of files (reading, writing and deletion) and directories (including subdirectories) without additional SecureOS