tenfold V24:
The Future of IAM

Customer review

โ€žEver since we started using tenfold, managing file server permissions has become both easier and more efficient. As one of many investments in the IT security of our company, it has helped us ensure that privileges are assigned correctly. Because of the softwareโ€™s intuitive and well-structured admin interface, it required little effort on our side to tailor the system to our needs. Once we have implemented the next steps, I am positive that our daily routines and IT lives in general will become more secure and more efficient.โ€œ

Andrรฉ Titz, IT Manager at
PKE Holding AG

Overview

Locations
Head office Vienna and 11 offices in different countries

Founding year
1979

Industry sector
Traffic, communication and safety engineering

Product
tenfold Essentials

Free Trial

Our No-Code Solution Makes IAM Easy.
Start Your Free Trial Today!

Data owners assign access rights

tenfold was then gradually rolled out to all divisions. After a brief training session, data controllers were able to make changes to access rights within their own areas of responsibility using the tenfold web interface. tenfold manages any technical details, such as the underlying AGDLP group structure, automatically in the background. Today, tenfold handles nearly all changes made to access rights throughout the corporation in a transparent and comprehensible manner.

Time and cost efficiency in the IT department

In terms of saving time, great achievements were made particularly with regard to access rights reports. In a matter of seconds, data managers are able to obtain intelligible reports on which employees have access to their data. This type of data review, which in tenfold is called the โ€œRecertificationโ€ process, will soon be mandatory at 6-month intervals.

Significant improvement of data protection

tenfold furthermore holds great potential in terms of improving IT security: โ€œEver since we started using tenfold, managing file server permissions has become both easier and more efficient. As one of many investments in the IT security of our company, it has helped us ensure that privileges are assigned correctly,โ€œ says Andrรฉ Titz, who is responsible for the operation of tenfold at PKE Holding AG.

Outlook

The next step will be to get tenfold to model the user lifecycle process, also known as โ€œJMLโ€ or โ€œJoiner-Mover-Leaver-Processโ€œ. This means that tenfold will document closely whenever a person joins or leaves the company or changes departments, and these processes will become standardized and automated. Titz looks to the future optimistically: โ€œBecause of the softwareโ€™s intuitive and well-structured admin interface, it required little effort on our side to tailor the system to our needs. Once we have implemented the next steps, I am positive that our daily routines and IT lives in general will become more secure and more efficient.โ€

Conclusion

The next step will be to get tenfold to model the user lifecycle process, also known as โ€œJMLโ€ or โ€œJoiner-Mover-Leaver-Processโ€œ. This means that tenfold will document closely whenever a person joins or leaves the company or changes departments, and these processes will become standardized and automated. Titz looks to the future optimistically: โ€œBecause of the softwareโ€™s intuitive and well-structured admin interface, it required little effort on our side to tailor the system to our needs. Once we have implemented the next steps, I am positive that our daily routines and IT lives in general will become more secure and more efficient.โ€

Andrรฉ Titz, IT Manager at
PKE Holding AG

Video Overview

See tenfold in Action With Our Feature Video

Book a 1:1 Demo

Schedule a Live Demo With One of Our Experts

Free Trial

Put tenfold to the Test With Our Free Trial!