Do the right people have the right access?

We spend so much time protecting our businesses from external threats, we often forget one of our greatest threats – insiders. As the number of internal and third party breaches continues to cause concern across organisations, the importance of managing who has access to what – to balance security with employee access to your systems - is critical. From May 2018, the General Data Protection Regulation (GDPR) will put customers and staff in control of their personal data, empowering them to choose how businesses and their third parties use their data. Where personal data is not treated correctly, individuals will have increased rights and can, in some instances, claim compensation. Regulators across the EU will have unprecedented power to enforce the legislation and impose hefty fines in instances of non-compliance.

Never before has preventing data loss been so important - your access governance plays an important part in your cyber security defences.

Service areas

Access governance

AccessAble provides your organisation with access governance as a managed service. AccessAble can help you meet access governance challenges by delivering a fully-functional access governance tool, providing greater security at a low cost. It helps to manage access with effective controls to minimise the opportunity for attacks through mistakes, misuse or malicious activity, cutting the risk of major losses through data breaches and protecting reputation

Learn more here

View more

IdAM strategy

We can help your organisation create a safer environment to operate by performing Identity and Access Maturity Assessments; Access Governance Strategy; Access Governance as a Service; Consumer Identity Strategy; IdAM Design and Implementation; Insider risk management.

View more

Privileged access management

In the world of cyber security, “privileged access accounts” are hot property for criminals. Privileged user accounts provide elevated access rights to critical systems and sensitive data; they are pervasive throughout the organisation and can include applications, systems or individual user accounts. These accounts are a powerful lure to malefactors because elevated access can enable them to gain a foothold on a corporate system and then stealthily move throughout the network to compromise other systems within the breached environment. Successful management of these privileged accounts (also known as administrative accounts) allow organisations like yours to keep their most sensitive data safe.

View more

Consumer identity management

Consumer identity management allows you to control your consumers’ digital persona when they engage with you as a provider, through whatever channel. The consumer (user of products and services) and provider (deliverer/maker of products and services) relationship is a delicate one, which needs trust to ensure that the right amount of personal characteristics or preferences are shared, used for an agreed and transparent purpose and support a positive consumer experience. Consumers will have different requirements for the means by which they wish to engage with providers, depending on the context. These need to be built into consumer/provider interactions and a mutuality of benefits needs to be built through a willing buyer/willing seller digital exchange.

View more

Contact us

Gill Williams
Partner, Intelligent Data Partnerships, PwC United Kingdom
Tel: +44 (0)121 265 6515
Email

Derek Gordon
Identity & Access Management - Director, PwC United Kingdom
Tel: +44 (0)131 260 4220
Email