Identity Intelligence

Identity Intelligence

Inspect and analyze who has access to what, how they got it, and how they use it.

Security

Security

Ensure that only authorized users have access to sensitive internal enterprise systems and data by centralizing policy enforcement.

Visibility

Visibility

Gain insight into who has access to what resources and understand what they do with the information with fine-grained audit and reporting capabilities.

Detection

Detection

Quickly detect threats and improve incident response by collecting and analyzing security events in real-time from numerous and often disparate data sources, using SIEM adapters.

Features

Standard reports

A variety of web-based reports which display usage and audit information across all users and all resources under management. For example, an administrator can select a date range and view the number of users who logged in via SSO or to a specific application during that time-frame, view the last date a specific user logged in, etc.

SIEM adapters

Profile management enables administrator self-service management of profile attributes such as User ID, Company Name, First Name, Last Name, Phone, City, and many more. Attribute tags/labels are translated for multi-lingual UI support.

API-driven reporting

Reporting capabilities are also readily available through standard API interfaces enabling IT to feed usage data into other business intelligence systems.

Identity Manager

Identity Manager

Designed for comprehensive identity and access management across the complex ecosystem of enterprise identities.

Authentication Manager

Authentication Manager

Validate that a user is who they claim to be, and establish trust across domains for single sign on.

Identity Intelligence

Identity Intelligence

Inspect identity, access and endpoint data then convert it to actionable information and insight.

Directory Services

Directory Services

Cloud-based directory and the tools to integrate and synchronize directories.