+49 30 3642803 0 | info@permsecure.com​

permSECURE - tenfold

tenfold

tenfold is an identity and access management software that allows you to create and manage user accounts automatically. With the modern web application, you visualize your permissions and involve data managers from the individual departments in all necessary steps of the processes and workflows.

Automation

Based on the master data of your users, such as position, department or location, a high degree of automation is possible. In doing so, tenfold can automatically assign roles, permissions and application accesses across systems and maps the entire lifecycle of your user accounts. From the entry into your company, to the change of department, to the exit of the user. Even time-controlled permissions are no problem for the application.

Workflows

With various workflows, tenfold ensures that the decision to approve a permission lies with the person responsible for the data or the application. All steps of a change are documented in an audit-proof manner and are permanently and completely traceable.

Recertification

Improve your access management with tenfold and establish a process for recertifying access by the responsible parties. They can regularly check and determine which of the assigned accesses are correct or obsolete.

Reporting and Traceability

Thanks to tenfold, you can always check who has access to your data and who granted access. You can generate reports for the most diverse questions and thus always maintain an overview.

Plugins

In addition, tenfold offers more than 60 third-party systems that can be connected via so-called plug-ins, including e.g. IBM Notes, Microsoft Dynamics NAV and various industry-specific systems.

You can find further information at www.tenfold-security.com.

Functions - Overview

Identity and Access Management

Control your user accounts and access to various applications or systems easily and securely.

Documentation and Reporting

The simple and modern interface visualizes the permissions and offers numerous reporting functionalities.

Self Service

Your users can request and approve permissions and other resources. Simply build your own self-service.

Recertification

Have your data owners regularly check the validity of the assigned permissions and correct them if necessary.

Why tenfold?

More Transparency

Confusing and obsolete access rights are a thing of the past with tenfold.

More
Transparency

Confusing and obsolete access rights are a thing of the past with tenfold.

More
Transparency

Confusing and obsolete access rights are a thing of the past with tenfold.

You can achieve a high level of automation through workflows, profiles and self-service functions.

More Efficiency

You can achieve a high level of automation through workflows, profiles and self-service functions.

More
Efficiency

More
Efficiency

You can achieve a high level of automation through workflows, profiles and self-service functions.

More Protection

You can track at any time which user had access to which systems in the company at which time. This enables you to comply with legal requirements, such as the German Data Protection Act (DSGVO) or the ISO 27001 standard.

More
Protection

You can track at any time which user had access to which systems in the company at which time. This enables you to comply with legal requirements, such as the German Data Protection Act (DSGVO) or the ISO 27001 standard.

More
Protection

You can track at any time which user had access to which systems in the company at which time. This enables you to comply with legal requirements, such as the German Data Protection Act (DSGVO) or the ISO 27001 standard.

Comprehensive reports allow you to keep track of their accesses and IT resources at all times. Include your users in the processes and recertify their permissions regularly.

More Control

Comprehensive reports allow you to keep track of their accesses and IT resources at all times. Include your users in the processes and recertify their permissions regularly.

More
Control

More
Control

Comprehensive reports allow you to keep track of their accesses and IT resources at all times. Include your users in the processes and recertify their permissions regularly.