Security and Compliance Engineering – Topeng
Extensible: Enterprise Security across structured data and unstructured content
- File systems (Collaboration)
Comprehensive Policy Management
- End to end (Develop/Customize/Deploy/Self-learn and improvise)
- Vertical (HIPAA, PII etc)
- Horizontal (Location/Device etc.)
Centralized Dashboard: One place for CSO to view security policies effectiveness
A company using cloud applications, prone to data leaks, have the obligation comply with data security regulations, compliance is an requirement not an options, growing with the need of agility.
Besides feature enhancements requested by the operators, we are helping the clients design the multi-tenancy for smaller operators, expanding support for various SSO standards and protocols adopted by service providers such as OAuth, SAML and OpenID and enabling some best practices related to token management (issue, refresh, revoke etc.)
In order to improve the user experience, the users logging into the service for the first time are automatically provisioned by the service based on the primary user signup. This feature adopted a different development model as in it was first prototyped and the flow and functionality are share with the customers to ensure the expectations are matched before a full-scale development efforts are invested.