{"id":5,"date":"2014-12-11T15:31:03","date_gmt":"2014-12-11T15:31:03","guid":{"rendered":"http:\/\/scytconsulting.com\/?page_id=5"},"modified":"2019-11-05T20:22:16","modified_gmt":"2019-11-05T20:22:16","slug":"home","status":"publish","type":"page","link":"https:\/\/scytconsulting.com\/hu\/home\/","title":{"rendered":"Kezd\u0151lap"},"content":{"rendered":"<p><!--:en--><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">\n<h3><span style=\"color: #ffcc00; font-weight: 300;\">Szoftver fejleszt\u00e9s \u00e9s integr\u00e1l\u00e1s<br \/>\n<\/span><\/h3>\n<\/td>\n<td style=\"text-align: center;\">\n<h3><span style=\"color: #ffcc00; font-weight: 300;\">Identity and Access Management tan\u00e1csad\u00e1s<br \/>\n<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 30%; padding-right: 3%; text-align: justify;\">M\u0171szaki tan\u00e1csad\u00f3k\u00e9nt rugalmas lehet\u0151s\u00e9get, emberi er\u0151forr\u00e1st k\u00edn\u00e1lunk \u00fcgyfeleink sz\u00e1m\u00e1ra, \u00edgy \u00fcgyfeleink \u00e9lvezhetik a gyakorlati tapasztalatunkkal j\u00e1r\u00f3 el\u0151ny\u00f6ket. A Scyt kor\u00e1bban sikerrel vett r\u00e9szt p\u00e9nz\u00fcgyi \u00e9s telekommunik\u00e1ci\u00f3s szoftverek fejleszt\u00e9s\u00e9ben, t\u00e1mogat\u00e1s\u00e1ban.<\/td>\n<td style=\"width: 30%; padding-left: 3%; text-align: justify;\">Az Identity and Access Management (IAM) az egyes felhaszn\u00e1l\u00f3k kezel\u00e9s\u00e9t, hiteles\u00edt\u00e9s\u00e9t, enged\u00e9lyez\u00e9s\u00e9t, jogaiknak a menedzsel\u00e9s\u00e9t jelenti egy szoftveren bel\u00fcl vagy annak hat\u00e1rain t\u00falmen\u0151en az eg\u00e9sz v\u00e1llalatra kiterjed\u0151en. Az IAM technol\u00f3gia felhaszn\u00e1lhat\u00f3 a felhaszn\u00e1l\u00f3i identit\u00e1sok \u00e9s a hozz\u00e1juk kapcsol\u00f3d\u00f3 hozz\u00e1f\u00e9r\u00e9si enged\u00e9lyek, jogosults\u00e1gok automatikus enged\u00e9lyez\u00e9s\u00e9re, r\u00f6gz\u00edt\u00e9s\u00e9re, kezel\u00e9s\u00e9re. N\u00f6veli a biztons\u00e1got, \u00e9s a produktivit\u00e1st mik\u00f6zben cs\u00f6kkenti a k\u00f6lts\u00e9geket a le\u00e1ll\u00e1sok idej\u00e9t \u00e9s az ism\u00e9tl\u0151d\u0151 feladatok sz\u00e1m\u00e1t. C\u00e9g\u00fcnk magas szint\u0171, professzion\u00e1lis tan\u00e1csad\u00e1st, tervez\u00e9st, megval\u00f3s\u00edt\u00e1st \u00e9s integr\u00e1ci\u00f3s t\u00e1mogat\u00e1st k\u00edn\u00e1l az Identity \u00e9s Access Management technol\u00f3gi\u00e1khoz<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Szoftver fejleszt\u00e9s \u00e9s integr\u00e1l\u00e1s Identity and Access Management tan\u00e1csad\u00e1s M\u0171szaki tan\u00e1csad\u00f3k\u00e9nt rugalmas lehet\u0151s\u00e9get, emberi er\u0151forr\u00e1st k\u00edn\u00e1lunk \u00fcgyfeleink sz\u00e1m\u00e1ra, \u00edgy \u00fcgyfeleink \u00e9lvezhetik a gyakorlati tapasztalatunkkal j\u00e1r\u00f3 el\u0151ny\u00f6ket. A Scyt kor\u00e1bban sikerrel vett r\u00e9szt p\u00e9nz\u00fcgyi \u00e9s telekommunik\u00e1ci\u00f3s szoftverek fejleszt\u00e9s\u00e9ben, t\u00e1mogat\u00e1s\u00e1ban. Az Identity and Access Management (IAM) az egyes felhaszn\u00e1l\u00f3k kezel\u00e9s\u00e9t, hiteles\u00edt\u00e9s\u00e9t, enged\u00e9lyez\u00e9s\u00e9t, jogaiknak a menedzsel\u00e9s\u00e9t jelenti egy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-full-notitle.php","meta":{"_locale":"hu_HU","_original_post":"5","footnotes":""},"class_list":["post-5","page","type-page","status-publish","hentry","hu-HU"],"_links":{"self":[{"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":57,"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/pages\/5\/revisions\/181"}],"wp:attachment":[{"href":"https:\/\/scytconsulting.com\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}