Enhanced Security and Compliance at KGAL GmbH with a Modern IAM Solution

Success Story·3 min
kgal-logo.png
KGAL GmbH & Co. KG
Financial Services

KGAL GmbH, one of Germany’s leading real asset managers, has elevated its access rights management to a new level. By implementing the Garancy Identity Manager from Beta Systems, the company now safeguards access to critical applications, strengthens IT security, and ensures full compliance with regulatory requirements.

Initial Situation: Manual and Time-Consuming Processes

Before implementing the Identity Manager, access rights at KGAL were managed manually – a time-consuming and error-prone process. Using Excel spreadsheets and ticketing systems required constant coordination, made regular access reviews cumbersome, and complicated compliance management. To minimize these risks and streamline operations, KGAL sought a professional Identity and Access Management (IAM) solution that would combine efficiency, security, and control.

Implementation: Automation with the Garancy Identity Manager

After a thorough evaluation of multiple vendors, KGAL selected the Garancy Identity Manager from Beta Systems in 2022. The solution has been in productive use since July 2023 and seamlessly integrates all relevant systems via uConnect technology.

Bernd Stiller und Sabine Mehner vor dem Gebäude der KGAL GmbH

Bernd Stiller and Sabine Mehner at KGAL GmbH

As a mid-sized company, we value working with a technology partner at eye level – with dedicated contact persons who respond quickly to our requests. Of course, the software also must be excellent and match our requirements.

Bernd Stiller
Project Manager Digital Workplace

With the new system, employee onboarding, offboarding, and departmental transfers are now automated, significantly reducing administrative effort and enhancing security. Regular recertifications of access rights are managed efficiently and transparently through the Garancy Recertification Center.

Through the Recertification Center, we can monitor progress much more effectively, review each employee’s permissions directly in the system, and ensure up-to-date access at all times.

Sabine Mehner
Vendor Management

A key element of the project was the introduction of a well-structured role model. It distinguishes between base, organizational, functional, and specialist roles, ensuring access rights are assigned precisely and transparently. For example, external service providers, such as auditors or tax consultants, also receive tailored access rights according to their tasks precisely when they need them.

Conclusion: IAM as the Cornerstone of Secure and Compliant IT

By implementing the Garancy Identity Manager, KGAL has established a centralized, transparent, and automated access rights management system. The result: reduced workload, improved security, and stronger compliance.

Ludwig Eggersdorfer im Gebäude der KGAL GmbH

Ludwig Eggersdorfer at KGAL GmbH

A centralized IAM solution is vital for building a modern and secure IT environment. Any company aiming to professionalize their access management should invest in IAM. With Beta Systems, we made the right choice.

Ludwig Eggersdorfer
Head of Digital Workplace, IT-Governance & Infrastructure Solutions
Read the full case studyRead the full case study

Customer

kgal-logo.png
Year of foundation
1968
Number of employees
400
Head office
Grünwald, Germany
Sector
Financial Services
KGAL GmbH & Co. KG
Tölzer Str. 15
82031 Grünwald
Germany

Further Resources

Blog Article
Data Pipelines

The Benefits of Data Pipeline Automation

As we move further into Industry 4.0, organizations are striving for greater efficiency, visibility, and reliability. This is especially true for enterprises, which handle vast amounts of data on a daily basis. The competition won’t be waiting – you’ll either move forward or fall behind. One way to avoid falling behind and improve overall efficiency is to automate data pipelines. Not only does it improve and accelerate data flow, but it also supports your analytics, helping you draw more accurate conclusions and make more precise predictions and forecasts. In this article, we will explore what data pipeline automation is, how to automate your data pipelines, and the benefits it brings to your organization.
Blog Article
website-blog-post.png

Data Workflow Automation: Complete Guide (2026)

Did you know that data teams waste up to 20% of their working week wrestling with failed scripts, stale exports, and manual reconciliation long before a single insight reaches a dashboard? If your pipelines still rely on cron jobs and spreadsheet management, you are not slow by accident. Data workflow automation replaces those manual, error-prone data tasks with reliable, end-to-end automated pipelines that ingest, validate, transform, and deliver data automatically and at enterprise scale.  This guide covers everything you need to know: what it is, why it matters, the types and components involved, the leading automation tools, and how to implement it in your organization.
Blog Article
Enterprise Automation Software Cloud Environment

Top 7 Features to Look for in Enterprise Automation Software

What features should your enterprise automation software have? At a minimum, it should provide efficiency-boosting capabilities such as real-time automation of business-critical processes, application process automation, and strong security measures like secure data transfer and robust data pipeline orchestration. In this article, we outline the most essential features to look for in enterprise automation software.