Secure IT access rights: 5 success factors for IAM projects

Who is permitted to use an IT system, and which authorizations are assigned? When introducing a central tool for Identity & Access Management (IAM), companies need to be meticulous. These five steps will help you achieve your goal reliably and keep costs under control.

A major rebuild: Getting ready for the New Normal

What will office life look like after the pandemic? Employees are seeking more flexibility, while companies are rethinking their interior concepts. Managers and operational teams should work together to determine their path to the New Normal, establishing clear rules.