Identity & Access Management
| Model | SEACURE(IAM) |
| Category | Network Security |
This item has been added to your cart.
Should I order it along with the items in my shopping cart?
Product Introduction
IAM (Identity and Access Management) solution is an "account and access authority management system"
that centrally and systematically manages the identity and access authority of users, equipment,
and applications on board a ship.
It automates the entire process, including identity authentication, authorization and change of each account,
and abnormal access attempt recording, to prevent accidents caused by unauthorized access and authority abuse.
According to the IACS UR E26 standard, ship networks must meet strict security requirements such as user identification,
access control, and authority management, and the IAM solution records all account and authority change history
as an event log and supports immediate administrator alerts in the event of abnormal access.
Product Features
- Automated user, device, and system-specific identity identification and authentication
- Role- and authority-based network/system access control
- Automatically records all history, including policy changes, access attempts, and abnormal events
- Supports various authentication methods, such as MFA and OTP
- Automated policy-specific approval/block settings and authority management
Product Introduction
IAM (Identity and Access Management) solution is an "account and access authority management system"
that centrally and systematically manages the identity and access authority of users, equipment,
and applications on board a ship.
It automates the entire process, including identity authentication, authorization and change of each account,
and abnormal access attempt recording, to prevent accidents caused by unauthorized access and authority abuse.
According to the IACS UR E26 standard, ship networks must meet strict security requirements such as user identification,
access control, and authority management, and the IAM solution records all account and authority change history
as an event log and supports immediate administrator alerts in the event of abnormal access.
Product Features
- Automated user, device, and system-specific identity identification and authentication
- Role- and authority-based network/system access control
- Automatically records all history, including policy changes, access attempts, and abnormal events
- Supports various authentication methods, such as MFA and OTP
- Automated policy-specific approval/block settings and authority management









