Loading
Access Manager
  • Solution
    • Join the orange side of life – Solution
      • Freedom for IT-Administrators
      • Permanent compliance with Data Protection Provisions
      • Greater Efficiency in IT Infrastructure
      • Who, What, How? Auditors Review Your Permission Situation
      • It’s all about the money!
    • Explore the Orange Side of Life
      • Ondal Medical Systems GmbH – Time and Cost Savings
      • ETECTURE GmbH – Higher Transparency in Access Management
      • University of Leipzig Medical Center – no Chance for Hackers
      • University Hospital Tübingen – Password Resets 24/7
      • Federal City of Bonn – efficient user account management
      • City of Cologne – optimised user management
      • Paris Lodron University Salzburg – Information security for thousands of users
      • Reiser Simulation and Training GmbH – efficient access management
      • Oberaigner Group – Access Rights Management and Documentation at the Push of a Button
      • Jörg Vogelsang GmbH & Co. KG – Self Service Access Management
      • Stadtwerke Wolfenbüttel GmbH – no longer an authorisation jungle
  • Modules & Features
    • Modules
      • Fileserver Management
      • SharePoint Management
      • 3rd Party Management
      • Fileserver Accounting
      • REST API
      • Password Reset
      • Identity Management
      • Easy Desktop
      • NTFS Permission Analyzer
    • Features
      • Automated Access Management
      • Autocorrect of Permissions
      • Self Service for End Users
      • Profile Management
      • Reapproval Process
      • GDPR Compliant
      • Transparency by Reporting
      • User Provisioning
      • Audit-proof Documentation
  • Services
    • Services
      • Individual Services
      • Permission Audit
      • Starter Package for Automated Access Management
      • Premium-Support
      • Licensing Model
      • System Requirements
    • Contact Us
      • Get your Trial
      • Request your Product Presentation
  • Company
    • BAYOONET AG
      • About us
      • We think proactively
    • Get Our Partners
      • Get to know our Partners
      • Become a Partner
  • Blog
  • Events
  • TRIAL
  • Customer Center
  • Search
  • Menu

IT Security Act 2.0

Much criticism and new requirements have come with the IT Security Act 2.0 since it came into force in May.

The aim of the renewed law is to increase security for IT systems and to strengthen the position of the Federal Office for Information Security (BSI).

Companies with a special public interest (e.g. with great economic importance) are now subject to the same obligations as operators of critical infrastructures. Who exactly will have to fulfil the requirements for CRITIS in the future (threshold values) is still being defined by the responsible authorities:

The obligations include, among other things, the reporting of security breaches and compliance with minimum protection standards for IT systems. These are self-reported by companies as part of a self-declaration on certifications, security audits and measures.

Take early action to protect your IT systems. Automated and secure self-service solutions for the access and identity journey of your employees and customers support you in firmly anchoring IT security in your company.

As experts for management software with two specialised solutions for IT security, we support you in this. With BAYOOSOFT Access Manager, you can use our in-house tool for automated authorisation management for file servers, SharePoint, Active Directory and third-party systems.

While you sustainably reduce operational efforts, e.g. in IT administration, you increase information security through monitoring, auditing and transparent reporting for the data managers in your departments.

Good to know

Do you know the BSI’s “Best Practice” recommendations for critical infrastructures? We have summarised what you need to know about authorisation management for CRITIS in a blog.

Are your emails securely encrypted? Internal and external communication is a second, central aspect of IT security issues. With the gpg4o® end-to-end encryption system, you use an established add-in for email encryption in Microsoft Outlook 2013/2016/2019® that can be seamlessly integrated into the user interface.

From here, messages and their attachments can be securely encrypted and decrypted, signed and checked. The clever tool is easy to install and simple to use.

There are many possibilities for more IT security. We will be happy to advise you on the right solutions for you.

Would you like to get to know the BAYOOSOFT Access Manager directly? Sign up for a 30-day TRIAL.

Test it now

News

  • Cybersecurity, Identity and Access ManagementWhat IAM, IDM and DAG are all about11. October 2022 - 14:31
  • Glühbirne vor grauem Hintergrund und mit Access Manager LogoBAYOOSOFT Access Manager Version 2022.1 – now available10. June 2022 - 16:41
  • Our new Whitepaper: Best Practices20. May 2022 - 16:11
Contacts at BAYOOSOFT 

Svenja Winkler
CEO
[email protected]

 

 

Franziska Weiß
Head of Sales
[email protected]

 

Darmstadt
Lise-Meitner-Straße 10
64293 Darmstadt

Munich
Aidenbachstraße 54
81379 München
Berlin 
Mariendorfer Damm 1-3
12099 Berlin

Phone: +49 (0) 6151 – 86 18 – 0
Fax: +49 (0) 6151 – 86 18 – 150

Contact: [email protected]
Support: [email protected]
Jobs: [email protected]
Press: [email protected]

  • Privacy policy
  • Legal
The hidden danger of manual authorization assignments Usability vs. data protection
Scroll to top