System Provisioning made easy
Perigon Cyber Access Secures Your On-Off Boarding & Access Provisioning.
Soch has made it easy to manage your organizations' access provisioning, whether it's 1 or 1,000 employees
Similar to how the TSA uses strict measures to keep you safe in the air, Perigon keeps your systems safe using the strictest protocols of any platform available. Do you have a single checkpoint for access to your systems? Most organizations do not. Soch offers a unique combination of HR on-off boarding with a system access module to keep track of who has been on/off boarded and who has what access, who requested each access, who authorized access, and who implemented it. With continuous daily threats of cyber thefts, it is imperative and critical to have secured on-off boarding processes and systems access provisioning with respect to your organization’s security policies in order to safeguard your systems and data. If you're responsible for ensuring access is granted or rescinded, with its easy to navigate UI and clearly defined structure, Perigon is the #1 choice to help you sleep more soundly at night, knowing your systems are safer from unwarranted intrusions.
One-stop-shop secure checkpoint
Digitizes paper forms
Restricts self authorization
360° view of employee access
Ensures security and privacy
On/Off Boarding Workflows
Onboarding & offboarding workflow for wage, classified, contractors & volunteers.
System access for new employees with respect to HR or working title.
Entitlements/roles for each system tied to onboarding a new hired position or title.
Real-time tracking of all onboarding, offboarding and modification requests.
Includes Manager, HR, IT/System Owner & Information Security Officer Approvals.
Workflow based on separation reason codes and terminate system access immediately.
Upon new requests for any employee or separation, notifications are sent to the responsible parties.
Timely termination of system access of offboarded employees.
Automated process to certify all employees for system and entitlement role access.
360° view of all system and number of active employees with entitlement.
Full visibility of who has what access and who authorized it. No more self authorization.
Every user activity is logged at field level to provide full traceability of who did what and when.
Efficient & Cost Effective
Stay in compliance with HR and system security policies.
Requires minimal configuration or specialized skill set.
Continual support from the Soch team.