This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
About AMI Prague
More than 30 IDM realisations in the Czech Republic and abroad
We are a system integrator operating in the ICT security segment, specializing in authentication/authorization processes and access control to information, regardless of the place of storage (document on shared or local storage, structured form of information in the information system).
We have been on the market for 28 years and provide our clients with professional services and personalized approach. Together with them, we always strive to find highly usable, efficient, and functional solutions that simplify work, reduce costs, and increase safety and profit. Our work has resulted in dozens of satisfied clients and numerous prestigious awards.
Top management
Membership and partnership
Evolveum is the creator of the popular opensource identity management software – midPoint. Evolveum was preceded in 2004 by the creation of nLight, which had already implemented IdM solutions from Sun and Novell. Between 2010 and 2011 it collaborated on the development of the first version of ForgeRock’s OpenIDM.
In 2011, Evolveum itself was founded and focused on the development of its own IdM solution midPoint. Evolveum emphasizes managing the development of the open source IdM product midPoint and working closely with its partners, clients and other developers.
AMI Praha is a Gold Partner of Evolveum.
CyberArk is a global leader in privileged access security. It offers a solution called PAM (Privileged Access Management). CyberArk helps organizations manage user access to systems or network infrastructure.
In 2018, Broadcom acquired CA Technologies, an information security company focused on comprehensive protection of users’ digital identities from theft and misuse. Specifically, we develop and deliver leading technologies and services in the areas of identity and access lifecycle management, privileged user auditing and monitoring, strong authentication and authorization with elements of risk and behavioral analytics, and last but not least, a platform for rapid development, operation and security of enterprise APIs. These solutions help our customers not only to elevate IT security to the highest possible level, but also to achieve overall success in today’s highly competitive digital environment.
SailPoint is in the business of providing identity management and governance for access to unstructured data.
Thales Group is a global supplier of electronics and other solutions for the aerospace, defence and security markets. The Security division of Thales deals with electronic security. Its portfolio includes products for payment transaction protection, authentication, application encryption, HSM (Hardware Security Module), time stamps or key management and protection for data storage encryption. At the beginning of 2019, Thales acquired the international security company Gemalto, becoming a leader in digital security.
In particular, Varonis can help you identify and protect sensitive data using detailed logging and identify data owners through simple audits.
Aricoma ID is a product solution (IdM, AM, PAM) that offers the ability to securely and efficiently manage individual access permissions to enterprise information systems and applications.
OKTA is an American identity and access management company based in San Francisco. It provides cloud-based software that helps companies manage and secure user authentication to applications and developers embed identity controls into applications, web services and website devices.
One Identity provides unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to their business.
Check Point Software Technologies has long been a global leader in enterprise security, focusing on comprehensive customer network security (Next Generation Threat Extraction). It is a leader in IPS (the first NSS Labs Recommend IPS), Application Control, URL Filtering (the largest database on the market) and Zero-Day Protection.
Oracle Corporation is one of the main companies developing relational databases, database development and management tools or customer relationship management (CRM) systems. It was founded in 1977 and employed 50,000 people in 2005. It is represented in 145 countries.
The Pentera platform is helping over 650 organizations in over 45 countries around the world discover their real-world, real-time security exposure by emulating real-life attacks on every cybersecurity layer.
Cisco Systems, Inc. is one of today’s largest computer companies and a dominant player in the networking field. Among other things, it manufactures switches, routers, VoIP gateways and IP phones, and is also active in the MFA field.
Microsoft (Nasdaq “MSFT”) is the world’s leading software, services and Internet technology company for personal and business use. The company offers a wide range of products and services.
WALLIX Bastion (Privileged Access Management – PAM/PIM) is an agentless proxy based modular solution designed to manage and control privileged users (administrators). It allows to create accesses and assign necessary permissions to privileged users (administrators) to managed systems, in the form of “Single Sign On”.
Safetica Technologies is a Czech technology company operating in the market of software protection against corporate data leaks to competitors. It has been developing products in the field of DLP (Data Loss Prevention) since 2007.
Palo Alto Networks is the only cybersecurity solutions provider that saves digital businesses from having to decide between the security they need today and what will last into the future. They strive to ensure their security solutions uncompromisingly meets both requirements.
DAASI International is an expert in (federated) identity and access management, exclusively using open source technology. Since its founding in 2000, the IT service provider from Tübingen, Germany deals with identity management, access control and directory service technologies for universities, public authorities and companies. Additionally, DAASI International participates in national and international research projects. The range of services covers consulting, support, hosting, and software development, as well as individualised trainings. DAASI International is furthermore a strong advocate for digital sovereignty and thus promotes open source, interoperable protocols and privacy.
The ReaQta-Hive platform has been designed as a comprehensive endpoint security solution for organizations. By combining the Hive Guard Anti-Malware module with the next-generation EDR platform, customers are essentially safe from any known or unknown threat, with a single dashboard to control the entire platform.
Axiomatics is a leading provider of dynamic authorization. For more than a decade, we have been supporting governments and enterprises to protect critical assets, meet stringent regulations, reduce costs and improve collaboration.
Progress Flowmon guarantees flawless operation and security of corporate networks. High scalability, detailed visibility, real-time threat detection.
BankID is a term you hear more and more often from all sides. BankID’s vision is to become the common means of online authentication and electronic signature in the Czech Republic. The BankID service is used to electronically identify individuals with a wide range of uses such as logging in, authentication, signing or even transmitting KYC data. In short, BankID will become an integral part of the digitalisation of services. Clients will use the same means to access service or product provider environments as they use to log into online banking. This will entail faster, more secure and, most importantly, cheaper client onboarding and automatic updating of client data. The actual logging in of clients to the service or product provider environment will become very intuitive and simple.
CYFIRMA helps you stay one step ahead of hackers by offering the ability to prevent cyber attacks through intelligent threat prediction.
GREYCORTEX Mendel provides accurate visibility of devices and network activity, advanced threat detection and automatic response to attacks.
Syxsense is an advanced endpoint management tool with a wide range of uses on any third-party application.
Netwrix enables you to counter digital threats by being able to identify and protect sensitive data no matter where it is located.
Founded in 1984 as Research In Motion (RIM), BlackBerry is now a leader in cybersecurity – helping enterprises, government agencies and security-critical institutions of all sizes secure the Internet of Things (IoT).
Logsign‘s unified SO platform simplifies security operations by offering a single integrated solution. It reduces the cost and complexity associated with individually managing multiple security tools. With next-generation SIEM, threat intelligence, UEBA and SOAR capabilities, organizations can optimize and streamline cybersecurity operations through a single platform.
Senhasegura specializes in security solutions and access rights management. The core product is the Senhasegura Privileged Access Management (PAM) platform, which enables organizations to secure and manage access and privileged account management. It does this through detailed monitoring of administrators on networks, servers, databases and various devices. In addition, Senhasegura prioritizes compliance with strict standards such as PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
Quality and security
AMI Praha holds ISO certificates for quality management according to ČSN EN ISO 9001 : 2016, IT services according to ČSN ISO/IEC 20000-1 : 2019 and information security management according to ČSN ISO/IEC 27001 : 2014. For our clients, a high level of internal management is a guarantee of seamless execution of entrusted projects and minimization of security risks.
Quality management on contracts allows us to prevent undesirable situations in projects and to benefit from the experience gained. A well-managed project is a win-win scenario. It gives the client confidence that their requirements will be met and enables AMI Praha to deliver contracts efficiently.
The company’s security policy not only sets high demands on the level of our own IT services but also obliges us to demand the same standard from our suppliers. By managing information security, we ensure we look after our customers’ data as if it were our own.
Providing high-level IT solutions at a high level is a matter of course for us. To ensure this, we set clear SLAs with our customers, which we also require from our suppliers. By measuring SLA performance more precisely and incorporating ITIL best practices, we have created the prerequisites for improving service for us and our customers.