E-time | the software company
Digital identity and corporate access management is now a key element for security, compliance, and internal organization.
For this reason, the E-time suite introduces YooPoint, the new IGA (Identity Governance and Administration) solution designed to simplify the management of users, permissions, and corporate access.
What is YooPoint, Identity Governance solution
YooPoint is an IGA solution developed to centrally manage identities, permissions, and corporate access.
The platform enables you to:
- manage users and credentials;
- control permissions and access rights;
- monitor access and transits;
- automate onboarding and credentialing processes;
- improve security and traceability.
Key features of the IGA solution
Identity governance
YooPoint supports companies in the structured management of digital identities, simplifying the control of roles, permissions, and authorizations.
Corporate access management
The IGA solution enables monitoring of entries, access, and user activity, improving security and operational control.
Process automation and system integration
YooPoint automates several access management activities, reducing manual operations and management time.
The platform can be integrated with existing access control systems and IT infrastructure, enabling centralized identity management.
YooPoint: perché scegliere una soluzione IGA e quali vantaggi offre
YooPoint is designed to support companies in the digitalization of access control processes, identity governance, and visitor management, offering a modern, centralized platform that can be integrated with existing infrastructure.
With YooPoint, companies can:
- improve digital identity governance;
- increase access security;
- centralize permissions and access rights;
- simplify onboarding processes;
- reduce manual activities and operational inefficiencies.
IGA & IAM: two complementary layers
YooPoint’s IGA (Identity Governance and Administration) solution is fully integrated with Yookey, the Identity & Access Management (IAM) software of the E-time family.
The integration between IGA and IAM allows organizations to centrally manage both identity governance and permissions, as well as authentication and access control processes.
This approach improves security, compliance, and traceability, while simplifying the operational management of users and corporate permissions.





