RM5 Software Oy     RM5 Software Oy
H�meentie 135A • 00560 Helsinki
Phone: +358 207 432 879
E-Mail: info@rm5software.com
Internet: http://www.rm5software.com

RM5 Software is a software company specialized to Entitlement Management.

RM5 IdM software offers a business centric solution to centralized Entitlement Management. RM5 IdM is an innovative software product for centralized management of business relations, service authorization rules, applications and network resources of Business Service Providers, Service Customers and 3rd parties organizations. RM5 IdM enables the administration of internal and external users´ Entitlements for internal and external systems and services.

RM5 IdM also enables the automation of entitlement processes and provides business-centric services for managing the lifecycle of entitlements. RM5 IdM contains powerful policy modeling capabilities, comprehensive administration processes and it supports the delivery of services based on real customer needs.

RM5 IdM´s hybrid deployment makes possible to obtain it as a service from commercial providers or be taken in use as a standard information system delivery.  RM5 IdM is ideal for customers looking for the SaaS solution and is especially strong when managing external users.

RM5 IdM is a business-centric SaaS product which also allows to start or expand MSP IdM business by offering centralized Entitlement Management as a Service.

RM5 IdM offers:

• Easy-to use business-friendly service administration user interface
• One unified  application for all administration
• Centralized identity and Entitlement repository
• Business-centric out-of-the box entitlement modeling capabilities
• Entitlement request and approval workflow
• Entitlement enforcement processes
• Service administration processes
• Reporting and Auditing for current and historical GRC processes
• Delegated administration processes
• Extended role-based access control
• Dynamic, Provisioned and E-mail based entitlement data sharing
• On-demand and scheduled Auditing for GRC 

RM5 IdM meets and exceeds business needs:

• Proven concept for modelling many-to-many business relations
• Multi-dimensional model that supports any changes in business or entitlement rules
• Multiple factors that enable dynamic and flexible control of authorization validity
• Multi-representation and context-based authorization
• Rich multi-tenant data model
• Out-of-the box entitlement management service
• Unified management of internal and external users
• Authorization for internal and external services
• Shared entitlement management service for corporate / industry units
• Delegated administration for self-service maintenance (both internal and external organizations)
• Power of Attorney & DAC access control

RM5 IdM identity repository can integrate with and serve 3rd party solutions:

• Authentication
• Access management
• Federation
• Network Admission Control
• Virtual Directories
• Enterprise Integration Applications
• Complement other IdM products

RM5 IdM ready-to-run functionalities enables rapid set-up of scalable Entitlement Management solution to implement organizations´ business models and processes.

Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype. Information
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , M�nchen
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden. Information
Webinar: One Entitlement Management for all � How to Manage all Users, Services, and Service Providers Consistently 21.04.2010 , 17:00-18:00 CEST, 11am Eastern
As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications. Information
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.