Success Story

Simple User Administration at DEVK – Even Without IT Assistance

Thanks to being able to outsource more and more standard tasks to the specialist departments – which is further facilitated by Garancy® Process Center – the IT team now has more time to tend to core tasks and can administrate a much larger user base with the same number of people.

Today, access governance is a top priority for DEVK. Garancy® IDM makes it much easier for DEVK to comply with access governance requirements.

DEVK Logo
Lutz Becker
Senior Specialist IAM Architecture, DEVK

Initial Situation

DEVK has been insuring German policy holders against the risks of everyday life for over 125 years. At present, the DEVK Group is tending to approximately 4 million customers, insuring them against 14 million risks across all segments. A total of over 6,000 employees go the extra mile to provide customers with quick and effective assistance. DEVK’s goal: significantly simplify and accelerate access rights allocation across all corporate IT systems. Even employees with little or no technical background should be able to take on certain user administration tasks.

Challenge

The IT department of DEVK had to connect a large number of sales representatives to the central, home-grown master data management application at short notice. Manual administration of these new clients would have resulted in a significant increase of the workload, which would have forced the insurer to substantially expand the IT team.

Implementation

The sophisticated role scheme of DEVK combines specialist competencies of the SAP system with the superordinate Garancy® Identity Manager authorization management. A workgroup creates the specific SAP roles together with the specialist departments and then hands them over to the IT service and operations team. This means that the SAP team is only responsible for defining the roles, but it does not allocate any users to them. This is the sole domain of the IAM system, which takes these SAP roles and combines them with authorizations for additional IT systems by creating high-level Garancy® roles.

“The Garancy® role has the highest authority; it bundles the entire specialist function range of each employee,” explains Lutz Becker. Using this approach, the authorizations needed for IT systems such as SAP, the insurance application or Windows depending on the specific task profile are defined as roles. In Garancy® Identity Manager, these roles are then linked with the personal authorization profile of each respective employee.

Given this setup, authorization management basically maps the entire organizational structure of the insurance company. This allows specialist departments to rapidly assign individual access rights to new employees. All that is left to do for IT staff is to clarify open issues in collaboration with the specialist department. Previously, new employees sometimes had to wait for up to five days before they had been properly and fully set up in the IT systems. Now it takes only two to three hours before they are connected to all systems they need to do their jobs.

Outcome

Thanks to the new version, it will become much easier for DEVK to comply with access governance requirements. This is a high-priority topic for the insurance company. Garancy® IDM from Beta Systems offers the option of defining dedicated risk parameters and information for the various entities: groups, roles and users. Given this capability, DEVK is planning to introduce user classes once the new version is in place.

Customer

DEVK Logo
Year of foundation
1886
Number of employees
7,500
Head office
Cologne
Sector
Insurance
DEVK
Riehler Straße 190
50735 Cologne
Germany

Share

Further Resources

Insight
Mann tippt am Laptop Anmeldedaten fuer autorisierten Systemzugang ein

Principle of Least Privilege: PoLP as an Essential Element for IT Security

In the modern corporate world, where cyber threats are becoming increasingly sophisticated, the focus on IT security has never been more important. An essential element in protecting sensitive data and IT systems is the Principle of Least Privilege. In this article, you will learn how this principle is used to minimize risks, protect sensitive company data and systems and ensure compliance with security standards – and also what the serious consequences are if it is not taken into account.
Insight
Aerial view of cargo ship and container harbor

IT Security in Logistics: Why IAM Is Important for Logistics Companies

In a world where global supply chains form the backbone of our economy, the logistics industry is facing enormous opportunities, but also challenges. Efficient and timely delivery of goods is now more important than ever, but increasing digitalization also comes with greater risks and requirements. While digital innovations boost efficiency, they also make the industry more vulnerable to cyber threats and associated data loss. In this context, Identity and Access Management (IAM) is becoming an indispensable tool to protect logistics companies and maximize their efficiency. This article explains why IAM is so essential for the logistics industry and how it can help overcome the many challenges it faces.
Whitepaper
Beta Systems Whitepaper IAM Implementation Methodology EN Cover

IAM Implementation Methodology

In our whitepaper, “Methodology of an IAM Introduction,” you will discover how to successfully implement Identity & Access Management (IAM) to enhance the efficiency and security of your IT infrastructure. Given the complexity and challenges of IAM projects, thorough planning and a systematic approach are essential. Our free whitepaper offers a comprehensive guide to navigating these intricacies and achieving successful IAM implementation.