This link leads you to a page outside of reist.swiss

Identity and Access Management

GET BACK THE CONTROL OF YOUR IDENTITIES.

We created for you a central solution to fully manage your users’ and machines’ identities. Integrating all the IAM features that are C-IAM, E-IAM, SSO, PAM, PIM, access management, identity governance, PKI, certificate management and digital document signing.

Your holistic and modular offering

AM (ACCESS MANAGEMENT)

Identity Administration
SSO
BYOI
Use Behavior Analytics
User Authentication
API Access Control
Directory Services and federation
User Self-Service
learn more

AM (ACCESS MANAGEMENT)

Access Management manages the identity lifecycle with all necessary features to onboard identities from everywhere, including LDAP, Active Directory, and any kind of cloud identities. It also enables Bring Your Own Identity (BYOI) or on-premises identity onboarding, as well as central unified login through OTP, Push, Certificate, FIDO2, external IDP, and more; Hello for Business is supported both from users and machines perspectives.

The SelfService and Credentials Reset portals give users the ability to manage their authentication methods and reset their password or enable temporary emergency access. The Operation Console for Help Desk and Administration allows support personal to assist end-users in an efficient way.

The solution can be integrated with any application through open-APIs and provides SSO access for any kind of applications through standard protocols (SAML, OpenID Connect).

DIGITAL SIGNATURE

Document signing
API signing
Advanced Signature
Corporate Signature
Qualified Signature
learn more

DIGITAL SIGNATURE

Digital Document Signing allows to digitally sign and verify the identity of a signer of an Adobe® PDF file. This process ensures that the document is original, has not been altered and can no longer be modified. It supports various types of signature levels, such as Qualified signatures, Advanced signatures, and corporate signing.

CA AS A SERVICE

Shared CA
OCSP
CRL
Public CA
Private CA
Root CA
Import Certificate
learn more

CA AS A SERVICE

CA as a service is a complete infrastructure including Registration Authority, CRL and OSCP, to be able to deliver certificates based on your needs. It supports several automation protocols and allows you to deploy your own internal certificates without the hassle of operating a PKI infrastructure.

HSM SERVICES

DKE
BYOK
Key Ceremony
KMS
learn more

HSM SERVICES

HSM as a service is a complete hardware security infrastructure based on Thales Luna 7x series. It provides an HSM partition or a full HSM as a service, and includes a formal key ceremony following the highest security standards for financial institutions, airlines or any other industries. HSM enables services such as:

  • Bring Your Own Key (BYOK) for Microsoft Azure and other type of services
  • Double Key Encryption (DKE)
  • Bring Your Own Encryption (BYOE)

AM (ACCESS MANAGEMENT)

Access Management manages the identity lifecycle with all necessary features to onboard identities from everywhere, including LDAP, Active Directory, and any kind of cloud identities. It also enables Bring Your Own Identity (BYOI) or on-premises identity onboarding, as well as central unified login through OTP, Push, Certificate, FIDO2, external IDP, and more; Hello for Business is supported both from users and machines perspectives.

The SelfService and Credentials Reset portals give users the ability to manage their authentication methods and reset their password or enable temporary emergency access. The Operation Console for Help Desk and Administration allows support personal to assist end-users in an efficient way.

The solution can be integrated with any application through open-APIs and provides SSO access for any kind of applications through standard protocols (SAML, OpenID Connect).

DIGITAL SIGNATURE

Digital Document Signing allows to digitally sign and verify the identity of a signer of an Adobe® PDF file. This process ensures that the document is original, has not been altered and can no longer be modified. It supports various types of signature levels, such as Qualified signatures, Advanced signatures, and corporate signing.

CA AS A SERVICE

CA as a service is a complete infrastructure including Registration Authority, CRL and OSCP, to be able to deliver certificates based on your needs. It supports several automation protocols and allows you to deploy your own internal certificates without the hassle of operating a PKI infrastructure.

HSM SERVICES

HSM as a service is a complete hardware security infrastructure based on Thales Luna 7x series. It provides an HSM partition or a full HSM as a service, and includes a formal key ceremony following the highest security standards for financial institutions, airlines or any other industries. HSM enables services such as:

  • Bring Your Own Key (BYOK) for Microsoft Azure and other type of services
  • Double Key Encryption (DKE)
  • Bring Your Own Encryption (BYOE)

CERTIFICATE AS A SERVICE

API
Certificate Life Cycle Management
Key Escrow
Role based access
Email Certificate delivery
...
learn more

CERTIFICATE AS A SERVICE

  • Ticketing integration
  • Role based access
  • Inventory integration
  • Auditing & discovery
  • Certificate cleanup
  • Share Certificate
  • Domain validation
  • Order Management
  • Designed for non-IT users
  • Monitoring
  • Cloud Service Connectors
  • CA agnostic
  • Certificate takeover
  • Automation delivery

Certificate as a service is a module designed to manage the certificate lifecycle and provides all necessary workflows within one central place. Focusing on simplicity, it is based on several years of experience as a Service Provider and doesn’t need any technical knowledge. The solution is PKI agnostic and addresses public and private Certificate Authorities. By increasing efficiency and lowering certificate management costs, it provides the necessary level of compliance. The network certificates scan module provides an overview of deployed certificates and allows to detect irregularities in their implementation.

PAM (PRIVILEGE ACCESS MANAGEMENT)

Account Discovery
Privileges Access governance
API Gateways
Privilege delegation
Provisioning Service / local account
learn more

PAM (PRIVILEGE ACCESS MANAGEMENT)

  • Credential Management
  • Task Automation
  • Session recording
  • Privileges Discovery
  • Vaulting

Privileged Access Management – PAM manages the lifecycle of privileged accounts such as local accounts, AD accounts and service accounts, provisioned from the central management console (on-premises and in the cloud). Auto discovery is enhanced with capabilities to compare the privileges of the account with templates (like group membership) and approval is required in case of discrepancies to keep or remove the highlighted privileges. Approval and separation of duties are central points of the PAM.

IGA

Auditing
Provisioning workflow
Analytics and reporting
Fraud Detection
Workflow process
learn more

IGA

  • Access Request
  • Life cycle
  • Approval workflow
  • Separation of duty

Identity governance and administration (IGA) is designed to manage the identity governance. This suite enables all necessary workflows from one central place and enables the management of provisioning on behalf, up to the completion of the deletion of the identity. It provides full flexibility to design any kind of approval, at any level and on any workflow, therefore enabling a proper separation of duties.

CERTIFICATE AS A SERVICE

  • Ticketing integration
  • Role based access
  • Inventory integration
  • Auditing & discovery
  • Certificate cleanup
  • Share Certificate
  • Domain validation
  • Order Management
  • Designed for non-IT users
  • Monitoring
  • Cloud Service Connectors
  • CA agnostic
  • Certificate takeover
  • Automation delivery

Certificate as a service is a module designed to manage the certificate lifecycle and provides all necessary workflows within one central place. Focusing on simplicity, it is based on several years of experience as a Service Provider and doesn’t need any technical knowledge. The solution is PKI agnostic and addresses public and private Certificate Authorities. By increasing efficiency and lowering certificate management costs, it provides the necessary level of compliance. The network certificates scan module provides an overview of deployed certificates and allows to detect irregularities in their implementation.

PAM (PRIVILEGE ACCESS MANAGEMENT)

  • Credential Management
  • Task Automation
  • Session recording
  • Privileges Discovery
  • Vaulting

Privileged Access Management – PAM manages the lifecycle of privileged accounts such as local accounts, AD accounts and service accounts, provisioned from the central management console (on-premises and in the cloud). Auto discovery is enhanced with capabilities to compare the privileges of the account with templates (like group membership) and approval is required in case of discrepancies to keep or remove the highlighted privileges. Approval and separation of duties are central points of the PAM.

IGA

  • Access Request
  • Life cycle
  • Approval workflow
  • Separation of duty

Identity governance and administration (IGA) is designed to manage the identity governance. This suite enables all necessary workflows from one central place and enables the management of provisioning on behalf, up to the completion of the deletion of the identity. It provides full flexibility to design any kind of approval, at any level and on any workflow, therefore enabling a proper separation of duties.

Use our service as a central sso point

To go anywhere from everywhere

Your advantages at a glance

Interface simple designed for operation
360 views on all your identities get back to the controls of your identities across the cloud
Privilege Identity Management and Vaulting
Single point of management for the identities of human & machine
Complete life cycle of identities / creation, decommissioning, emergency access, reenrollment
Invite external person to use myservices, onboard on behalf, sponsored on boarding
SSO cloud, SSO legacy, SSO nonstandard application
PKI life cycle and automation
Certificate as a service
Document signing
Key encryption provider BYOE
HSM as service (BYOE, DKE, BYOK)

More information needed?

Get in touch with us.

We are happy to discuss open questions and opportunities with you.

Alain Favre

Teamlead Identity & Access Management
call send e-mail