{"id":1968,"date":"2022-11-23T13:18:54","date_gmt":"2022-11-23T12:18:54","guid":{"rendered":"https:\/\/staging.markenstellwerk.at\/cockpit-consulting\/?page_id=1968"},"modified":"2024-03-11T14:31:49","modified_gmt":"2024-03-11T13:31:49","slug":"it-wissensmanagement","status":"publish","type":"page","link":"https:\/\/cockpit-consulting.at\/en\/it-projektmanagement\/it-wissensmanagement\/","title":{"rendered":"IT knowledge management"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1968\" class=\"elementor elementor-1968\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97c86f3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"97c86f3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ad6063\" data-id=\"6ad6063\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f6208e elementor-widget elementor-widget-jet-breadcrumbs\" data-id=\"8f6208e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-breadcrumbs jet-blocks\">\n\t\t<div class=\"jet-breadcrumbs\">\n\t\t<div class=\"jet-breadcrumbs__content\">\n\t\t<div class=\"jet-breadcrumbs__wrap\"><div class=\"jet-breadcrumbs__item\"><a href=\"https:\/\/cockpit-consulting.at\/en\/\" class=\"jet-breadcrumbs__item-link is-home\" rel=\"home\" title=\"Home\">Home<\/a><\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cbc6661 elementor-section-full_width elementor-section-height-min-height elementor-section-content-bottom elementor-section-items-bottom elementor-section-height-default\" data-id=\"cbc6661\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8400018\" data-id=\"8400018\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc09b92 elementor-widget elementor-widget-heading\" data-id=\"dc09b92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Identity and access management<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2012bf elementor-widget elementor-widget-heading\" data-id=\"a2012bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Clarity of Competence through Identity and Access Management<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db78714 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"db78714\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identity- and Access Management governs within the company which individuals, either in the core or sister companies, have access to corporate data, enabling them to perform their tasks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-09bfc6e animated-slow elementor-invisible\" data-id=\"09bfc6e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b47028c elementor-widget elementor-widget-heading\" data-id=\"b47028c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Change and growth as triggers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef991aa elementor-widget elementor-widget-text-editor\" data-id=\"ef991aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In growing companies, corporate acquisitions, and after multiple changes in processes or personnel over the years, a proliferation arises concerning \"Who is allowed to do what?\" and \"Who needs what?\"<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f293d0e elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f293d0e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af3deba\" data-id=\"af3deba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d11a871 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d11a871\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Example from practice<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-194ee8c elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"194ee8c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-386501e animated-slow elementor-invisible\" data-id=\"386501e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ecb7c59 elementor-widget elementor-widget-text-editor\" data-id=\"ecb7c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In an international wholesale company that had clear identity automation, access automation, however, lagged behind. Over the years, the approximately 8,000 access rights for various roles in the company became blurred.<\/p><p>The result: Long and cumbersome processes emerged during the onboarding and offboarding of employees, as well as with external partners and suppliers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7112ae elementor-widget elementor-widget-heading\" data-id=\"a7112ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Access management became a balancing act, coupled with the risk of unauthorized access.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5e0181d animated-slow elementor-invisible\" data-id=\"5e0181d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8112e99 elementor-widget elementor-widget-heading\" data-id=\"8112e99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Modern Identity and Access Management (IAM) System in the Cloud as a Solution<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8499c4 elementor-widget elementor-widget-text-editor\" data-id=\"f8499c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After a comprehensive redesign of roles and access rights, they were stored in a modern and secure IAM cloud solution.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0bbf6e elementor-widget elementor-widget-text-editor\" data-id=\"b0bbf6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The achieved results were:<\/p><ul><li>Short-term deployment of the new solution<\/li><li>The automation level of role assignment increased from 8 % to 70 %<\/li><li>Full transparency of access rights \u2013 who has permission to do what?<\/li><li>100 % compliance fulfillment<\/li><li>Clear and understandable role concept for everyone<\/li><li>Self-service is now possible due to standardized processes and high usability<\/li><li>Minimization of the risk of unauthorized access<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5b39884 animated-slow elementor-invisible\" data-id=\"5b39884\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35c3472 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-invisible elementor-widget elementor-widget-image\" data-id=\"35c3472\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"1200\" src=\"https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system.jpg\" class=\"attachment-full size-full wp-image-4609\" alt=\"\" srcset=\"https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system.jpg 1200w, https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system-300x300.jpg 300w, https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system-1024x1024.jpg 1024w, https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system-150x150.jpg 150w, https:\/\/cockpit-consulting.at\/wp-content\/uploads\/2023\/05\/coc-identity-management-system-768x768.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a480c21 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a480c21\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-deadb57\" data-id=\"deadb57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7439221 elementor-widget elementor-widget-heading\" data-id=\"7439221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Management by IT<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c72902d elementor-widget elementor-widget-heading\" data-id=\"c72902d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">We are happy to support you in the implementation of your IT projects<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a955ee3 elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a955ee3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cockpit Consulting has over 10 years of experience in companies involved in software development, the consumer goods industry, the energy sector, or organizations in the education sector.\"<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da3f0f6 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-button\" data-id=\"da3f0f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;pulse&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"mailto:%20office@cockpit-consulting.at\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-mail-open\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home Identity und Access Management Kompetenz-Klarheit durch Identity- und Accessmanagement Identity- und Accessmanagement regelt im Unternehmen, welche Personen im Kern- oder in Schwesternunternehmen Zugriff auf Unternehmensdaten haben, damit sie ihre Aufgaben ausf\u00fchren k\u00f6nnen. Change und Wachstum als Ausl\u00f6ser Bei wachsenden Unternehmen, Unternehmenszuk\u00e4ufen und nach mehreren Changes bei den Prozessen oder beim Personal entsteht im Lauf [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":78,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1968","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/pages\/1968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/comments?post=1968"}],"version-history":[{"count":10,"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/pages\/1968\/revisions"}],"predecessor-version":[{"id":5665,"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/pages\/1968\/revisions\/5665"}],"up":[{"embeddable":true,"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/pages\/78"}],"wp:attachment":[{"href":"https:\/\/cockpit-consulting.at\/en\/wp-json\/wp\/v2\/media?parent=1968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}