References

More than 50 IDM realisations in the Czech Republic and abroad

AMI Praha Reference
Industry:
All
Competence:
All
Solution:
All
Order:
From newest

Deployment of the Safetica solution for SwissLife Select

To minimize the risk of sensitive data leakage and ensure compliance with security standards, a DLP solution was implemented to provide full control over its management and protection.

Migration of IdM for Switch

In 2024, contact was made with Switch. In the second half of the year, two smaller projects were implemented – the so-called Due Diligence and migration of the Identity Management (IdM) from the infrastructure of the original supplier to the Switch infrastructure. The first project focused primarily on the analysis of the customer’s environment (infrastructure, […]

Migration from OneLogin to Okta for Emplifi

The move from OneLogin to Okta was driven by the need for a more integrated solution that matches Emplifi’s expectations for SSO capabilities. Below is a step-by-step summary from the initial selection of Okta to the final shutdown of the OneLogin instance.

Analysis of the current state of cyber security

The task of the project was to analyse the current state of affairs in relation to cyber security for the end customer of Greats advokáti, s.r.o. – Colosseum a.s., a securities trading company. In order to design an effective solution, it was important to perform an in-depth analysis of the IT infrastructure, using the following […]

Endpoint management and security SyxSense for INVESTIKA

SyxSense endpoint management and security solutions through real-time monitoring, detection and intelligent automation of vulnerabilities for IT management, patch management and remediation in a single console, including vendor support. The unified SyxSense solution includes Full Visibility, Cloud and Patch Management.

Prediction of cyber attacks CYFIRMA for Vojenské lesy

An external threat management platform CYFIRMA. The deployment of the service into the internal environment provides information about vulnerabilities from the outside from the perspective of a potential attacker, as well as information about certificates used; information about open ports; prepared and conducted phishing attacks; identification of fictitious similar websites, social network profiles and more; […]

IdM midPoint development at Zentiva in 2019-2023

In 2019, a contract was signed for the supply of Evolveum’s IdM midPoint (MP) tool and over the course of 5 years, the installation, basic integration and connection of key end systems was completed. In addition, functional development of MP has taken place across a number of agreed production releases. The period then concluded with […]

Prediction of cyber attacks CYFIRMA for CTU

An external threat management platform CYFIRMA. The deployment of the service into the internal environment provides information about vulnerabilities from the outside from the perspective of a potential attacker, as well as information about certificates used; information about open ports; prepared and conducted phishing attacks; identification of fictitious similar websites, social network profiles and more; […]
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.