Loading
Access Manager
  • Solution
    • Join the orange side of life – Solution
      • Freedom for IT-Administrators
      • Permanent compliance with Data Protection Provisions
      • Greater Efficiency in IT Infrastructure
      • Who, What, How? Auditors Review Your Permission Situation
      • It’s all about the money!
    • Explore the Orange Side of Life
      • Ondal Medical Systems GmbH – Time and Cost Savings
      • ETECTURE GmbH – Higher Transparency in Access Management
      • University of Leipzig Medical Center – no Chance for Hackers
      • University Hospital Tübingen – Password Resets 24/7
      • Federal City of Bonn – efficient user account management
      • City of Cologne – optimised user management
      • Paris Lodron University Salzburg – Information security for thousands of users
      • Reiser Simulation and Training GmbH – efficient access management
      • Oberaigner Group – Access Rights Management and Documentation at the Push of a Button
      • Jörg Vogelsang GmbH & Co. KG – Self Service Access Management
      • Stadtwerke Wolfenbüttel GmbH – no longer an authorisation jungle
  • Modules & Features
    • Modules
      • Fileserver Management
      • SharePoint Management
      • 3rd Party Management
      • Fileserver Accounting
      • REST API
      • Password Reset
      • Identity Management
      • Easy Desktop
      • NTFS Permission Analyzer
    • Features
      • Automated Access Management
      • Autocorrect of Permissions
      • Self Service for End Users
      • Profile Management
      • Reapproval Process
      • GDPR Compliant
      • Transparency by Reporting
      • User Provisioning
      • Audit-proof Documentation
  • Services
    • Services
      • Individual Services
      • Permission Audit
      • Starter Package for Automated Access Management
      • Premium-Support
      • Licensing Model
      • System Requirements
    • Contact Us
      • Get your Trial
      • Request your Product Presentation
  • Company
    • BAYOOSOFT
      • About us
      • We think proactively
    • Get Our Partners
      • Get to know our Partners
      • Become a Partner
  • Events
  • TRIAL
  • Customer Center
  • Search
  • Menu Menu

IT Security Act 2.0

Much criticism and new requirements have come with the IT Security Act 2.0 since it came into force in May.

The aim of the renewed law is to increase security for IT systems and to strengthen the position of the Federal Office for Information Security (BSI).

Companies with a special public interest (e.g. with great economic importance) are now subject to the same obligations as operators of critical infrastructures. Who exactly will have to fulfil the requirements for CRITIS in the future (threshold values) is still being defined by the responsible authorities:

The obligations include, among other things, the reporting of security breaches and compliance with minimum protection standards for IT systems. These are self-reported by companies as part of a self-declaration on certifications, security audits and measures.

Take early action to protect your IT systems. Automated and secure self-service solutions for the access and identity journey of your employees and customers support you in firmly anchoring IT security in your company.

As experts for management software with two specialised solutions for IT security, we support you in this. With BAYOOSOFT Access Manager, you can use our in-house tool for automated authorisation management for file servers, SharePoint, Active Directory and third-party systems.

While you sustainably reduce operational efforts, e.g. in IT administration, you increase information security through monitoring, auditing and transparent reporting for the data managers in your departments.

Good to know

Do you know the BSI’s “Best Practice” recommendations for critical infrastructures? We have summarised what you need to know about authorisation management for CRITIS in a blog.

Are your emails securely encrypted? Internal and external communication is a second, central aspect of IT security issues. With the gpg4o® end-to-end encryption system, you use an established add-in for email encryption in Microsoft Outlook 2013/2016/2019® that can be seamlessly integrated into the user interface.

From here, messages and their attachments can be securely encrypted and decrypted, signed and checked. The clever tool is easy to install and simple to use.

There are many possibilities for more IT security. We will be happy to advise you on the right solutions for you.

Would you like to get to know the BAYOOSOFT Access Manager directly? Sign up for a 30-day TRIAL.

Test it now

Interesting links

Here are some interesting links for you! Enjoy your stay :)

Pages

  • Access Manager auf dem Bechtle IT-Forum Rhein Main Neckar
  • Automate Access Management Successfully
  • Automate your Access & Identity Journey
  • BAYOOSOFT
  • BAYOOSOFT Berechtigungsaudit (EN)
  • Blog
  • Calendar 2020
  • Connector Matrix42
  • Contact support
  • Customer Center AM & AMPR
  • Customer Center AM Member
  • Customer Center AMPR Member
  • Customer Voices
  • Data Protection Compliance
  • Digital Flyer
  • Edit profile
  • Events
  • Exklusives Wechselangebot für 8MAN Kunden
  • Exklusives Wechselangebot für 8MAN Partner
  • Explore the Orange Side of Life
  • Features
  • Forum
  • Home
  • Interface documentation
  • Join the orange side of life
  • Legal
  • Login
  • Modules
  • Modules & Features
  • Newsletter Unsubscribe
  • NTFS Permission Analyzer
  • Password Reset
  • Password Reset Webinar 08th Dezember 2020
  • Privacy & Compliance
  • Privacy Policy
  • Privacy policy
  • Product Presentation Inquiry
  • Reset password
  • Sensitive data with peace of mind
  • Services
  • SharePoint Management
  • The Access Manager at the secIT 2021
  • The BAYOOSOFT Access Manager – Your way out of the KRITIS crux
  • TRIAL request
  • Upcoming events
  • Whitepaper: Managing authorisations securely and sustainably – Best Practice

Categories

  • Editorial
  • Events
  • General
  • News
  • Releases
  • Whitepaper
  • Privacy Policy
  • Legal
The hidden danger of manual authorization assignmentsUsability vs. data protection
Scroll to top