Identity lifecycle management / Concept of a Unified Identity Space

We will secure the user accounts of all those users (internal and external) who are accessing information systems or applications. We will set up identity lifecycle management, account consolidation and ability to trace unauthorized access. We will make tools for role management, automation of granting user permissions, support business process management and approving access requests through an automated approval workflow. We use the proven concept of the so-called Unified Identity Space.

Required level of Confidential information protection / effective access control system (authentication, authorization, SSO)

We will prepare a set of measures to grant all users permissions to the resources that they need to access. The aim is prevention of unnecessary granting rights and elimination of unauthorized access, but at the same time it is necessary to pay attention to efficiency and productivity of users and administrators who are accessing system resources.

Privileged Account Management and Monitoring

User management will be tuned to perfection in case that every administrator of information systems and applications has their own personal account. If administrators use shared administrator accounts (root accounts), there is no possibility to clearly determine who performed a specific operation. We will therefore take care of increased control of administrator accounts, protection against misuse of administrator accounts and monitoring of activities performed over privileged user accounts.

Ensuring compliance with legislation (Act on Cyber Security, GDPR etc)

We will implement our solutions so that they will be in accordance not only with legislation in force, with General Data Protection Regulation (GDPR) and other regulations, but to meet the strict requirements of Act on Cyber Security.


Česká národní banka

Czech National Bank

Our team carried out an implementation of an application for the communication of the Central Register of Accounts with the Data boxes information system. The project included requirements analysis, draft and implementation of a solution that now works to the contentment of the CNB. We provide the customer with support, maintenance and development services for the delivered solution.

Modrá pyramida

Modrá pyramida

The specialist in providing housing loans places high demands on IT and user security. Modrá pyramida has chosen our company as a partner for this area. We delivered a SIEM system to the customer. The provision of complete support, development and update of new versions of the delivered solution is part of the service as well as security consultations and advice on resolving security incidents.

Czech Point


We designed many agendas and services. Within this project, we implemented a unique system of user management known under the name JIP/KAAS (Unified Identity Space / Catalog of Authentication and Authorization Services). Thanks to the unambiguous authentication and authorization of every user we achieved non-repudiation responsibility of the user. The project Czech POINT has been successfully working for a lot of years!

Datové schrány

Data boxes

We created a unique system for state-guaranteed electronic communication between citizens, commercial companies and public authorities via a data box. It guarantees a high security level for users and transmitted data.

Contact us

We are specialists in IT processes, digitization, data protection and access management.