How do we work and for whom?

Capabilities, knowledge, markets, quality and innovation

For Identity and Access Management (IAM) and Data Security, it must be clear what our customers ask and need. Both from the point of view of their own working methods and legislation/regulations. That is why we start all new projects and larger changes with business consultancy.

On the other hand, as a supplier, we need to have knowledge of new developments in the market, of the products we use and to have experience with other customers that we can bring to new customers.

As a customer, how can you be sure that we offer this? Below, we explain what we have and what we do to provide good services.


Our employees have a lot of experience

We have a long experience with IAM and Data Security and a clear focus. Capitar Security has split from Capitar IT group as of 1 January 2020 and will take the knowledge of three specialist companies that formed the basis of the IAM and Data Security services at Capitar IT Group: IGI Group, ManageID and RealOpen IT. These three companies had been providing the services we are now further focusing on since 2004. They brought expertise in innovative solutions, business consultancy, technical knowledge, and IDaaS (Identity as a Service).

The industries where we have a lot of experience are:


**1. Education** ![Students in library](/images/studentlibrary.jpg)

We have extensive experience with education, where the flow of identities must be very well organised. We need to integrate with specific services, such as those provided by Kennisnet and SURF. User-friendliness is an important aspect for education, but there is also increasing attention for privacy and security.

2. Healthcare Doctor

Healthcare institutions require good security combined with maximum user-friendliness and the facilities must be continuously available.

We help many healthcare institutions with good access security (access management), with a good data classification and we know that ease of use and continuity are very important for healthcare institutions. We also help with IoT security. Many of our customers in healthcare make use of our 24x7 support and management.

3. Corporate market keyboard

The business market demands efficiency in working and complying with laws and regulations. Continuity of service is of great importance, as is security where competition-sensitive information, customer information, etc. are concerned. We often help with a risk analysis to determine where access rights really need to be regulated properly.


Our skills

  • We know IAM processes inside out
  • We know how to map them on organisations taking into account current processes and culture
  • We translate desired functionality and IAM processes into technical specs for the IAM solutions we use
  • We are the largest partner of Micro Focus IAM products in the Netherlands:
    • NetIQ Identity Manager
    • Identity Aanalytics
    • NetIQ IGA
    • NetIQ Access Manager, including UserApp
    • NetIQ Advanced Authentication framework
    • NetQ eDirectory
  • We install, implement and operate these products

Training

IAM and Data Security are fields for which there are hardly any training courses. The knowledge and experience we have is scarce in the market and we therefore make every effort to pass it on to new employees. We train all new employees ourselves. We can also train employees of our customers.


Quality is important

To ensure the quality of our services, we are ISO9001 (processes) and ISO27001 (information security) certified. The latter includes ISO 27017 (information security for cloud services) and ISO27018 (privacy protection for cloud services).

More important than the certifications is that the employees have a great sense of quality and are very customer-oriented. They are enthusiastic about the company and their work, and where necessary they go the extra mile to help the customers!


We have a clear vision on IAM and Data Security

Our vision can be read here. We also use a modular concept for IAM in our consulting. We first applied this in 2014, but it is still relevant today. In 2020, KuppingerCole introduced the concept of ‘identity fabrics’, which uses the same thinking: dividing IAM into parts that can be implemented separately while connecting well together. Our model has been adjusted over the years to keep up with changing developments in technology and approaches to information security. We also use this modular approach in implementations of Micro Focus software. The concept lends itself perfectly to determining which modules an organisation does and does not need (now and in the future) and what the right roadmap is for an organisation.

Our model has been adjusted over the years to keep up with changing developments in technology and in the approach to information security. We also use this modular approach in implementations of Micro Focus software. The concept lends itself perfectly to determining which modules an organisation does and does not need (now and in the future) and what the right roadmap is for an organisation.


We stay on top of the field

We keep our knowledge up to date by:

  • Implementing IAM at many organisations and developing our own best practices and concepts
  • Following market analysts: Gartner, Forrester and KuppingerCole (we follow publications, seminars and several conferences per year)
  • Attend conferences and seminars of IAM product suppliers
  • Follow developments of IAM vendor products and some open source products
  • Memberships in relevant organisations
  • Contact with and advice from industry organisations

We stay abreast of new developments, but only implement new functionalities and software after they have proven themselves and in close consultation with our software suppliers