Identity and Access Management (IAM) is critical for protecting your data, apps, and network from modern cyber attacks. By enforcing organizational policies and verifying every access request, IAM acts as a firewall for your digital resources.
With IAM, you can:
DrayTek’s IAM solution, built into DrayOS 5 and debuting with the Vigor2136 Series, brings Zero Trust security to your network gateway—helping you stop threats before they reach your core systems.
Watch the video to learn what is IAM is and how DrayTek IAM enhances your network security.
Creating and managing user identities and profiles across systems
Defining who can access what resources based on roles and permissions
Verifying the identity of users for Single Sign-On, Multi-Factor Authentication, and Risk-Based Authentication
Determining whether a user has permission to access a resource or perform an action for privileged Access Management and Data Governance
Automating the creation, management, and deactivation of user accounts for Federated Identity Management, reducing help desk requests
Making periodic copies of your configuration for backup/recover
You can define the access policy for your LAN network users with multiple access control methods like:
And you can define the login session lifetime to assure each access is under your control and management.
For Group Policy management, you can either use the default firewall settings or customize the Group Firewall Policies. This allows you to integrate content filters (such as keyword exceptions) and configure outbound IPv4 to enhance network security and optimize traffic flow. You can also check the syslogs for IP and content filter logs to evaluate the performance of your Group Policy.
To intensify the access security management, you can add in "Conditional Access Policy" to:
By doing so, each access from any user will be required to get verified in advance.
You can define and record local resources to ensure secure access to critical resources within your network, such as workstations, network printers, PBX systems, NVR systems, and business operation systems (ERP, CRM, SCM, SRM, PLM, or human capital management)
You can also add in the ICMP setting to report errors and generating network diagnostics.
It's an feature which has been adopted in our Vigor routers for long time like:
You can integrate it into your IAM system to enhance the flexibility, agility, and integrity for your security management.
Back up or restore settings such as Users and Groups, Access and Group Policies, and more. For added security, you can enable password protection before taking any action.