Protec
Acceleration and governance of CyberArk privileged account security
Streamline the collection and management of regulatory data
Govern, control and demonstrate mastery over identities and access
Your ally for managing DORA, NIS, AI Act, ISO and beyond
Maintain control over risks associated with your critical third parties
Manage and demonstrate the compliance of your AI systems
Optimize your control and assessment campaigns
Centralize the collection, analysis and tracking of safety data
Efficiently manage your IS security
Discover our mission and values
Our social and environmental impact
Join us
Our strategic alliances
All our news
Our next meetings
Discover our success stories
Structure identity lifecycle management (Joiner / Mover / Leaver) at the source using HR systems, directories (AD, Azure AD), IAM or internal repositories. Key attributes are normalized to ensure consistent access management over time.
Centralise the catalogue of applications, roles, groups and permissions.
Model rights using RBAC approaches and, where necessary, attribute-based rules (ABAC) to align access with actual responsibilities.
Provide a self-service portal for access requests, integrating approval circuits (manager, application owner, security), escalations, SLAs and temporary access management with automatic expiry.
No-code workflows enable you to industrialise these processes without complicating the user experience, while orchestrating controls, validations and remediations in a consistent way.
Automate the assignment and revocation of rights via SaaS and on-premise connectors. Systematic deprovisioning upon leaving reduces the risk of dormant accounts and improves overall security.
Synchronisation with directories, groups and licences ensures consistent access across the entire IT system. Workflows enable consistent orchestration of controls, validations and remediations.
Organise periodic recertification campaigns involving managers, application managers and compliance teams. Reviews focus primarily on high-risk access: elevated privileges, sensitive rights, inactive accounts or SoD conflicts.
Each decision is tracked to provide actionable audit evidence.
Define segregation of duties rules tailored to your business challenges (e.g. supplier creation vs payment).
The platform enables you to detect and manage conflicts, either preventively or reactively, and to document the decisions made.
All actions are tracked: requests, validations, provisioning, withdrawals.
Identity and access data are consolidated to provide a unified and actionable view of access governance. Dashboards provide a clear view of compliance, discrepancies, deadlines and trends.
Audit trails meet the requirements of internal and external standards (ISO 27001, SOC 2, regulatory requirements).
Assess the risks associated with identities and access: privileges, exposure to sensitive data, abnormal behaviour.
Detecting dormant or orphaned accounts is easier, and recommendations can be made (typical rights by position or role). This ongoing analysis helps strengthen identity security by identifying abuses and excessive permissions.
Deploy IGA at scale with unlimited users and projects.
Choose cloud or on-premise deployment based on your infrastructure and constraints.
Connect HR, IAM, ITSM and business applications via REST APIs and configure workflows in no-code.