Comarch Identity & Access Management (IAM) is a highly customizable tool that offers effective identity management and world-class methods for user authentication and authorization. It allows for granting and managing access to applications, devices and crucial data within a telecom organization. The system’s modular architecture makes it easy to adapt the solution to specific organization types across hierarchies and geographies.
The main beneficiaries of the Comarch IAM solution are companies processing personal, system and sensitive data. Comarch IAM may be used for providing multi-factor strong authentication methods by both software and hardware. The solution offers Single Sign-On mechanism which facilitates a secure login to many of the systems being offered by telecoms. It also allows the user to adjust role and access permissions, delegate privileges and provides vital assistance in meeting the GDPR requirements as well. Comarch IAM also supports field service companies to ensure business performance and data security throughout the service process.
With solutions belonging to our tPro family, we offer two-factor authentication (2FA) allowing privileged telecommunications staff to apply stronger security measures to both employee and customer data. Thanks to this, strong and various customer authentication methods meeting PSD2 requirements are provided.
The tPro suite consists of two products: tPro Mobile and tPro ECC. The first one is mobile security application (also available as SDK), developed for Android and iOS app versions. The tPro ECC is hardware device including ECC tokens or OTP tokens.
The entry authentication in a facility protected by Comarch IAM solution can be performed by the tPro Mobile token application enabling user verification with PIN or biometric feature (fingerprint).
Comarch also offers security audits focusing on risk analysis, penetration tests as well as audits of compliance with standards, guidelines and good practices, which help to identify potential threats and gaps in the protection of telecommunications data.
Tell us about your business needs. We will find the perfect solution.