Web Summit 2018


SCROLL DOWN

Web Summit 2018


WIN
a 1 month free trial

(worths 2999 EUR)

The Winner gets a free 1 year subscription to our Risk Analyser solution! (cloud/on-premise based, can be chosen!)

Alpha (1).png
  • on average, more than 70% of elemental access right are never used by the authorized persons?

  • on average, more than 95% of user access requests are approved by the data owners in an IDM workflow process?

  • many unnecessary access rights are given to employees at the implementation phase of business applications?

  • many data owners got no clue what the required access right requests mean exactly?

  • many data owners approve the requests without knowing the risks?

  • unnecessary access rights may lead to errors or frauds?

  • having an IDM system does not guarantee there are no unnecessary access rights at the users?

Did you know, that…

Not interested? We understand.

Please SHARE with someone, who might have access-right issues.

The Challenge


"Our services help our customers to save Human Resource, time and money on access right reviews"

Tamas MIHALY, Founder

The Challenge


"Our services help our customers to save Human Resource, time and money on access right reviews"

Tamas MIHALY, Founder

accesses.jpg

The Challenge

Establishing an effective and reliable cyber defense program requires a strong foundation of internal controls. Today, cyber criminals influence employees via social engineering to unwittingly assist in malicious activity. Adversaries target employees with privileged accounts in the enterprise architecture. User roles are changing dynamically in a modern enterprise, therefore the identity, role and access management review should be key elements of any daily IT security routine. If the role of an employee changes, a review of existing access rights should be part of the administrative change procedures, otherwise inappropriately-assigned access rights begin to accrue inside the architecture, creating layers of vulnerabilities for bad actors to manipulate.

Our Mission


OUR MISSION

Our Mission


OUR MISSION

IN OUR AGE, ACCESS CONTROL COMPLIANCE SHOULD NOT BE A TOPIC FOR LARGE COMPANIES ONLY!

HERE AT XS MATRIX WE BELIEVE, THAT THE UNDERLYING TECHNOLOGY SHOULD BE ACCESSIBLE AND

AFFORDABLE TO ALL COMPANIES.


OUR MISSION IS:

TO ENABLE OUR CUSTOMERS TO PROTECT THEIR SENSITIVE INFORMATION BY PROVIDING STATE-OF-THE-ART RISK ASSESSMENT AND MANAGEMENT SERVICES FOCUSED ON USER ACCESS RIGHTS AND ACCOUNT PERMISSIONS. OUR SOLUTIONS ARE CHARACTERIZED BY FLEXIBILITY, RESPONSIVENESS AND COMPETITIVENESS AND WILL ALWAYS REPRESENT THE LEADING-EDGE IN THE CYBER SECURITY INDUSTRY.


Services


OUR SERVICES

Services


OUR SERVICES

 

About US:

XS Matrix Security Solutions uses a proprietary risk-based access control technology and embedded Segregation of Duties (SoD)  and GDPR intelligence to provide state-of-the-art enterprise architecture risk assessment and risk management services focused on user access rights and accounts.

XS Matrix is headquartered in Budapest, Hungary where we maintain our technical and management functions. Forward facing Risk Specialists are positioned in Europe and the US to support our customers and partners.

ACCESS CONTROL RISK ASSESSMENT

SERVICES FOR:

  1. Business Application Layer: e.g. SAP ERP, HCM, CRM, S4HANA
  2. Database Layer: e.g. Oracle Database, MS SQL Database
  3. Middleware Layer: e.g. IBM MQ
  4. Operating System Layer: e.g. Active Directory, Windows Servers, LDAP, AIX Servers, Linux Servers
  5. Virtualization Layer: e.g. VMWare, vSphere, vSphere with Operation Management
 
 

Our Team


MEET THE TEAM

Our Team


MEET THE TEAM

 

Our Leadership Team

 

 
tamas_mihaly_xsmatrix-1.jpg

Tamás Mihály

President and Co-Founder, CISA, CISM

Tamás holds a degree in Economics with an emphasis in Information Systems. Tamás has over a decade of experience in the financial sector as Chief Information Security Officer (CISO) specializing in internal fraud prevention, data leakage protection and access rights monitoring.

Harold Teasdale

Vice President and Co-Founder, CISA, CISM

Harold holds a degree in Finance and 17 years of experience in cybersecurity including 11 years as Managing Director in Hungary and Slovenia for Symantec—one of the world’s foremost cyber security service providers.

kiraly_krisztian

Krisztián Király

Chief Architect, leader of the development

Krisztián holds a mathematician programmer degree and has 13 years of experience in different domains of software development and design. Krisztián has worked for numerous developer companies and was a key member of the IT division of a financial institution.

 

The Extended Team


EXTENDED TEAM

The Extended Team


EXTENDED TEAM

OUR ACCESS CONTROL RISK SPECIALISTS

All our Access Control Risk Specialists have at least 10 years’ experience in cyber security. Cyber Security is one of the most dynamic, complex and challenging fields in information management. Deep understanding in a narrow range is not enough. To be effective you need comprehensive understanding of the industry combined with the practical experience required to understand our customers’ problems. At XS Matrix our specialists help customers create effective information protection strategies that provide security without sacrificing usability.

What can you expect from our crew:

  • Responsive and customer-focused support
  • Results: Driving risk as close to zero as possible
  • Extensive knowledge in Identity Management (IDM) and Separation of Duties (SoD)
  • Expertise in frameworks, regulations and industry best practices (ISO27001/2, COBIT)
  • Industry-standard certifications (CISA, CISM, CGEIT)
  • A commitment to our customers and partners–we stay engaged to help you anticipate and address an always changing data security environment

 

 

    Why Choose Us?


    WHY CHOOSE US?

    Why Choose Us?


    WHY CHOOSE US?

     

    VALUE
    Superior, customer-focused solutions and a competitive price

    CAPABILITY
    We provide comprehensive, multi-layered Access Rights audits.

    EFFICIENT
    Automated collection, analysis and risk assessment dramatically reduces the time and resources needed for Periodic (or Non-Periodic) Access Rights Reviews.

    EFFECTIVE
    Our solutions help you prioritize risks to meet your compliance and internal control requirements.

    INTELLIGENT
    The embedded XS Matrix Segregation of Duties (SoD) intelligence engine is the result of a more than ten years of development. We’ve mastered the “least privilege rule” to automatically eliminate conflicting rights in account privilege settings.