{"id":37146,"date":"2021-07-30T14:52:38","date_gmt":"2021-07-30T13:52:38","guid":{"rendered":"https:\/\/www.firstware.com\/?page_id=37146"},"modified":"2024-06-12T10:24:38","modified_gmt":"2024-06-12T09:24:38","slug":"compliance","status":"publish","type":"page","link":"https:\/\/www.firstware.com\/en\/compliance\/","title":{"rendered":"Compliance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;39697&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1628253184739{margin-top: -20px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1647332931511{padding-top: 15px !important;}&#8221;]\n<h1>Compliance<\/h1>\n<h2 style=\"margin-top: 0;\">Security and efficiency through automated policies<\/h2>\n<p>Enforce laws, regulations and your own guidelines in accordance with the rules:<\/p>\n<p>from naming conventions to automation and compliance checks.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; top_margin=&#8221;30&#8243; bottom_margin=&#8221;0&#8243;][vc_column el_class=&#8221;whitetext&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;far fa-check-square&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23security&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;menu_icon&#8221;]\n<h3><a href=\"#security\"><span style=\"color: #002d73;\">Security<\/span><\/a><\/h3>\n[\/vc_column_text][vc_column_text]\n<p>Implement security rules: get rights assignments approved by responsible parties.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-shield&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23dataprivacy&#8221;][vc_column_text]\n<h3><a href=\"#dataprivacy\"><span style=\"color: #002d73;\">Data privacy<\/span><\/a><\/h3>\n[\/vc_column_text][vc_column_text]\n<p>Restrict access to employees&#8217; personal data and provide compliant solutions.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-layer-group&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23authorizations&#8221;][vc_column_text css=&#8221;&#8221;]\n<h3><a href=\"#authorizations\"><span style=\"color: #002d73;\">Authorizations<\/span><\/a><\/h3>\n[\/vc_column_text][vc_column_text]\n<p>Automate rule-compliant access rights based on properties and events in IDM-Portal.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;far fa-copy&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23audit&#8221;][vc_column_text]\n<h3><a href=\"#audit\"><span style=\"color: #002d73;\">Audit<\/span><\/a><\/h3>\n[\/vc_column_text][vc_column_text]\n<p>Include reporting and auditing by business departments and auditors.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221;][vc_column][vc_column_text]\n<h2>Rule compliance with FirstWare IDM-Portal<\/h2>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-alignleft&#8221; el_id=&#8221;security&#8221;][vc_column_text el_class=&#8221;FA-alignleft&#8221;]\n<h3 style=\"text-align: left;\"><strong>Security<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Compliance with FirstWare IDM-Portal means securing the regulatory conformity of company policies.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\"><strong>Information security <\/strong>is protected in multiple ways. Secure your users&#8217; access through role management. Control permissions based on policies, time periods, and approvers.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Policy enforcement includes regular control processes by people in charge of permissions::<\/p>\n<ul>\n<li style=\"text-align: left;\">legal rules, such as the <strong>GDPR<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>regulatory requirements<\/strong> &#8211; industry-specific or self-imposed (such as ISO 27001)<\/li>\n<li style=\"text-align: left;\"><strong>corporate policies<\/strong>, such as naming conventions and job-related authorizations<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:140px;\"><\/div><\/div>[vc_column_text]\n<p><img decoding=\"async\" class=\"alignnone wp-image-37303 size-full\" title=\"Compliance - Information security with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png\" alt=\"Compliance - Information security with IDM-Portal\" width=\"500\" height=\"284\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png 500w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1-300x170.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:70px;\"><\/div><\/div>[vc_column_text]\n<p><img decoding=\"async\" class=\"alignnone wp-image-37314 size-full\" title=\"Compliance - Data privacy with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Data-privacy-450x385-1.png\" alt=\"Compliance - Data privacy with IDM-Portal\" width=\"450\" height=\"392\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Data-privacy-450x385-1.png 450w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Data-privacy-450x385-1-300x261.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_id=&#8221;dataprivacy&#8221;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Data privacy<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">IDM-Portal meets legal data protection requirements (GDPR) in several ways. The storage of personal data is fundamentally limited to Active Directory or Entra ID, which are already recorded in the data protection management system.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Access to <strong>personal identity data is double protected<\/strong> (conceptually and technically) by a well thought-out role authorization concept in IDM-Portal.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">Integrate substitution rules or solutions, such as the out-of-office assistant for colleagues, with IDM-Portal in a <strong>data privacy-compliant<\/strong> manner.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Consultation<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; el_id=&#8221;authorizations&#8221;][vc_column][vc_column_text]\n<h2>Regulated access authorizations<\/h2>\n[\/vc_column_text][vc_column_text]\n<p>Rule adherence is especially important for <strong>compliance with authorization policies<\/strong> in order to ensure information security.<br \/>\nOverauthorizations, which arise, for example, as a result of departmental changes, must also be avoided.<\/p>\n<p>IDM-Portal offers <strong>two solutions for compliance<\/strong>, which can also be combined:<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-alignleft&#8221;][vc_column_text el_class=&#8221;FA-alignleft&#8221;]\n<h3 style=\"text-align: left;\"><strong>Compliance automation<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Ensure from the outset that employees are given appropriate IT authorizations. Upon joining,<strong> rights are automatically assigned<\/strong> that the user may have according to department, activity and function in the company. Any changes to the position lead to automated and traceable data changes.<\/p>\n<p style=\"text-align: left;\">An authorization concept according to company specifications is based, for example, on:<\/p>\n<ul>\n<li style=\"text-align: left;\">location<\/li>\n<li style=\"text-align: left;\">division and department<\/li>\n<li style=\"text-align: left;\">job title<\/li>\n<li style=\"text-align: left;\">management and specialist function<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:40px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-37368 size-full\" title=\"Compliance - Automation with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Compliance-automation-en-500x394-1.png\" alt=\"Compliance - Automation with IDM-Portal\" width=\"500\" height=\"394\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Compliance-automation-en-500x394-1.png 500w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Compliance-automation-en-500x394-1-300x236.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#ffffff&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:80px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-37403 size-full\" title=\"Compliance - Authorization compliance check with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Authorization-compliance-checks-en-500x405-2.png\" alt=\"Compliance - Authorization compliance check with IDM-Portal\" width=\"500\" height=\"405\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Authorization-compliance-checks-en-500x405-2.png 500w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Authorization-compliance-checks-en-500x405-2-300x243.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Authorization compliance check<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Compliance checks are an important addition. If additional authorizations are assigned permanently instead of temporarily, security risks arise. With IDM-Portal, those responsible regularly <strong>check resource and security authorizations<\/strong>.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">The cycle and type of review are defined by the guidelines. IDM-Portal enables automatic notifications and evaluations. With one click, the owner checks his authorizations in IDM-Portal.<\/p>\n<ol>\n<li style=\"text-align: left;\">Email for authorization verification<\/li>\n<li style=\"text-align: left;\">One click to open IDM-Portal<\/li>\n<li style=\"text-align: left;\">Verification of eligible members<\/li>\n<li style=\"text-align: left;\">Adjustment and approval<\/li>\n<li style=\"text-align: left;\">Automatic logging of the process for audits<\/li>\n<\/ol>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Contact us<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#eff5ff&#8221; el_id=&#8221;audit&#8221;][vc_column][vc_column_text]\n<h2>Traceability and compliance audits<\/h2>\n[\/vc_column_text]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:20px;\"><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-alignleft&#8221;][vc_column_text el_class=&#8221;FA-alignleft&#8221;]\n<p class=\"absatz\" style=\"text-align: left;\">Compliance with corporate guidelines is an active process. This must also be traceable for security experts in <strong>audits<\/strong>.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">IDM-Portal includes <strong>detailed logging<\/strong> of direct and asynchronous actions. Time-controlled actions and workflows can be tracked and are available for evaluations.<\/p>\n<p style=\"text-align: left;\">The <strong>reporting<\/strong> of IDM-Portal offers various standardized reports. In addition, special requirements of companies and organizations can be implemented. The automatic dispatch of reports is also possible if security policies allow it.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<p><img decoding=\"async\" class=\"alignnone wp-image-36730 size-full\" title=\"IDM-Portal - Audit and reporting\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Audit-und-Reporting2.png\" alt=\"IDM-Portal - Audit and reporting\" width=\"500\" height=\"340\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Audit-und-Reporting2.png 500w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Audit-und-Reporting2-300x204.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n[\/vc_column_text]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:20px;\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:40px;\"><\/div><\/div>[vc_single_image image=&#8221;36705&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<!-- Abschnitt 5 --><\/p>\n<h2>IDM-Portal and Compliance<\/h2>\n<p><strong>Employees comply with policies.<\/strong><\/p>\n<p class=\"absatz\"><strong>Traceable and verifiable.<\/strong><\/p>\n<ul class=\"featureList aligncenter\">\n<li class=\"tick\">Integrate corporate policies<\/li>\n<li class=\"tick\">Flexible customization in security issues<\/li>\n<li class=\"tick\">Sensitive handling of personal data<\/li>\n<li class=\"tick\">Audit and reporting<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung aligncenter\">Inquire now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column][vc_column_text]\n<h2>Advantages with IDM-Portal<\/h2>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;FA-align-left&#8221;]\n<p class=\"absatz\" style=\"text-align: left;\">Guidelines that speak against <strong>classical IAM systems<\/strong>:<\/p>\n<ul class=\"featureList\">\n<li class=\"cross\" style=\"text-align: left;\">No redundant personal data storage (often in relation to GDPR)<\/li>\n<li class=\"cross\" style=\"text-align: left;\">HR and department heads are responsible for employee data<\/li>\n<li class=\"cross\" style=\"text-align: left;\">Owner performs authorization check by himself<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-align-left&#8221;][vc_column_text el_class=&#8221;FA-alignleft&#8221;]\n<p class=\"absatz\" style=\"text-align: left;\"><span style=\"font-weight: 400;\">Compliance requirements that speak for <strong>IDM-Portal<\/strong>:<\/span><\/p>\n<ul class=\"featureList\">\n<li class=\"tick\" style=\"text-align: left;\">Multi-level approval workflows for special authorizations<\/li>\n<li class=\"tick\" style=\"text-align: left;\">Department-specific naming conventions<\/li>\n<li class=\"tick\" style=\"text-align: left;\">Settings on the user account are only set by the user or a representative designated by the user (e.g. out of office assistant)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1629115079994{margin-bottom: -60px !important;}&#8221;][vc_column][vc_column_text]\n<h2>Contact<\/h2>\n<p class=\"absatz\">You can reach us at<\/p>\n<p class=\"absatz\" style=\"color: #003a93; font-size: 1.2em; font-style: 800;\"><a href=\"tel:+4981969984330\">+49 81 969 984 330<\/a><\/p>\n<p class=\"absatz\">or via our<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\"><button class=\"ButtonBeratung aligncenter\">Contact form<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;39697&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-37146","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compliance - FirstWare IDM-Portal - Security and data privacy<\/title>\n<meta name=\"description\" content=\"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security &amp; Data Privacy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance - FirstWare IDM-Portal - Security and data privacy\" \/>\n<meta property=\"og:description\" content=\"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security &amp; Data Privacy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/\",\"name\":\"Compliance - FirstWare IDM-Portal - Security and data privacy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Compliance-Information-Security-en-500x284-1.png\",\"description\":\"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security & Data Privacy\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Compliance-Information-Security-en-500x284-1.png\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Compliance-Information-Security-en-500x284-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance - FirstWare IDM-Portal - Security and data privacy","description":"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security & Data Privacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/compliance\/","og_locale":"en_US","og_type":"article","og_title":"Compliance - FirstWare IDM-Portal - Security and data privacy","og_description":"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security & Data Privacy","og_url":"https:\/\/www.firstware.com\/en\/compliance\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/compliance\/","url":"https:\/\/www.firstware.com\/en\/compliance\/","name":"Compliance - FirstWare IDM-Portal - Security and data privacy","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png","description":"Implement enterprise compliance requirements with IDM-Portal. Automated Policies | Authorization Compliance Check | Security & Data Privacy","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/compliance\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Compliance-Information-Security-en-500x284-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=37146"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37146\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=37146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}