We've created the platform that will not only assist you with a 'cloud first' strategy, but can ultimately be the workspace platform in use at your organization. iWelcome is built by the experts in the market, is secure, simple, frictionless, scalable, convenient to use and always up!
With only a press on the button, new users can be authorised to use company or 3rd Party resources and information. Functionality that is then instantly available on all devices that you allow. First day provisioning actually has become first minute provision.
With similar ease, new applications can be added to existing user communities or to specific people in specific roles. Adversely access rights can be terminated on the spot!
Adding another SAAS application for only 10 people? iWelcome ensures this remains within the security and management framework of your organization.
With iWelcome you benefit from shared functional innovation. iWelcome is committed to include client specific and industry practice innovation in its platform. Instantly available in new releases.
The iWelcome model allows starting small and adding users, systems, workflow and reporting as you go. iWelcome can be up and running within days or weeks, rather than months or years as would be required for common Identity and Access Management Projects.
iWelcome offers the cost advantage of the SAAS model. You only pay for what you use, with only a set-up fee to start your service!
By paying as you go and paying as you grow, the costs are always in line with the business case of your company. Both on corporate and department level.
As no initial project or license costs are required, iWelcome turns Capital Expenditure into Operational expenditure.
iWelcome enhances insight and predictability of ICT costs by providing usage statistics and clearcut itemized monthly invoices.
Total Costs of Ownership and operational risks are further reduced due to iWelcome's economies of scale. iWelcome services many organizations and is on top of industry developments. Both technical and functional innovation is included,... as you go.
iWelcome is committed to offer all the highest standards for security and governance.
The platform has been built using the latest in Identity & Access Management technology and concepts and includes extensive reporting for governance and compliancy.
The platform resides in datacenters with ISO 27001 certifications and can optionally provide SAS70 I / II reports. Disaster recovery, and data replication are built in.
Naturally iWelcome uses the strongest encryption methods when traversing the Internet. And the service complies with the Dutch Privacy Legislation framework (Wet Beveiliging Persoonsgegevens - WBP).
iWelcome supports periodic or real time access reviews, soll-ist analysis, privileged user management, SIEM, forensic access reporting and so on. With the built in access governance capabilities of iWelcome, time to compliancy may be reduced to days!
With iWelcome you have the means to instantly scale and descale to the requirements of the business – even if this is temporary. The platform offers seamless integration with on-premise, cloud and supply chain originated services.
You now have an solution to manage access to those cloud applications you see popping up everywhere within your organization. At the same time you can still provide the Single Sign On experience your users already are familiar with for your internal applications. And that they are expecting for cloud applications as well.
iWelcome is build on robust proven technology and open-standards. The service has the highest performance levels and comes with extended business hours or 24x7x52 support.
Using iWelcome enables your ICT department to direct skill and investment to core process-, rather than facilitating ICT. It reduces the costs and risk of implementing supporting infrastructure to zero.
User administration is a cumbersome and time consuming task. It often involves labor intensive, error prone and manual provisioning processes using difficult to understand paper forms. On-boarding a new user can take days, if not longer and terminating accounts for people leaving the organization gets least priority.
Even if you have put in the proper tools, processes and controls for your enterprise applications you may suddenly become faced with new applications in the cloud. This has further increased complexity of providing and revoking access to these applications in an efficient, secure and controlled manner.
User management can be delegated and the self-service capability of iWelcome empowers users to view and manage their identity information, requests access and change and reset their own passwords, further decreasing the load of the administration teams.