Inspect and analyze who has access to what, how they got it, and how they use it.
Ensure that only authorized users have access to sensitive internal enterprise systems and data by centralizing policy enforcement.
Gain insight into who has access to what resources and understand what they do with the information with fine-grained audit and reporting capabilities.
Quickly detect threats and improve incident response by collecting and analyzing security events in real-time from numerous and often disparate data sources, using SIEM adapters.
A variety of web-based reports which display usage and audit information across all users and all resources under management. For example, an administrator can select a date range and view the number of users who logged in via SSO or to a specific application during that time-frame, view the last date a specific user logged in, etc.
Profile management enables administrator self-service management of profile attributes such as User ID, Company Name, First Name, Last Name, Phone, City, and many more. Attribute tags/labels are translated for multi-lingual UI support.
Reporting capabilities are also readily available through standard API interfaces enabling IT to feed usage data into other business intelligence systems.