Gartner Magic Quadrant IGA Role Management
Unify role life cycle management and access governance across your enterprise
The Avatier Identity Management Software Suite (AIMS) meets or exceeds most compliance regulations. AIMS minimizes IT governance risks from business users and system administrators with excessive role entitlements. Avatier identity management software ensures access certification compliance regardless of an enterprise’s size, structure and complexity.
Avatier Identity Management Suite (AIMS) IGA Role Management
AIMS | Description |
---|---|
AIMS | Role life cycle management and access governance. |
AIMS | Import, aggregate and correlate user information and entitlements from any platform, database or application. |
AIMS | Import, aggregate and correlate user information from database and flat file imports. |
AIMS | Activity monitoring system of record with full audit trail support. |
AIMS | Certification dashboard to view certification status and historical trending. |
AIMS | Entitlement review reports and role assignment data reports. |
AIMS | FERPA compliance reporting: 99.32, 99.35, 99.38 and 99.62. |
AIMS | NIST 800-53 compliance reporting for: AU-3, AU-6, AU-7 and CA-2. |
AIMS | HIPAA compliance reporting: 164.308, 164.310, and 164.312. |
AIMS | NERC CIP compliance reporting 001 Unusual Access, 003 access certification and 007 Security Management. |
AIMS | PCI DSS compliance reporting of Requirement 2, 3, 6, 7, 8, 9 and 10. |
AIMS | SOX 302, 404 and 802 compliance reporting and audit controls. |
AIMS | Patented analytics engine. |
Access Governance | Perform role, entitlement cleanup, modifications, and tune-ups at any time. |
Access Governance | Perform access certification revoke at anytime to cleanup access and entitlements. |
Access Governance | Perform role and access certification. |
Access Governance | Certify role owners and business unit owners. |
Access Governance | Role owners, managers or other assigned resources can certify existing access. |
Access Governance | Role and entitlement attestation. |
Access Governance | Enterprise-class access certification compliance management. |
Access Governance | Role and entitlement remediation. |
Access Governance | Immediate revocation or batch revocation after a certification audit is complete. |
Access Governance | Account attestation and access certification for roles containing account-creation privileges. |
Identity Analyzer | Role discovery and mining. |
Identity Analyzer | Discover roles and entitlements for any platform, database or application. |
Identity Analyzer | Mine and derive role(s) from multiple sources. |
Identity Analyzer | Discover orphan accounts through report automation and alerts. |
Identity Analyzer | Create and maintain comprehensive identity data model. |
Identity Analyzer | Business reporting analytics engine. |
Lifecycle Management | Discover entitlements for role based on users that have access to that role. |
Lifecycle Management | Specify optional entitlements for a given role. |
Lifecycle Management | Risk assessment scoring applied to entitlements with in an IT Store and shopping cart. |
Lifecycle Management | Perform role administration. |
Lifecycle Management | Perform role approval, expiration and tuning activities at any time without interrupting workflow. |
Lifecycle Management | Delegate roles and entitlements at any level. |
Lifecycle Management | Map entitlements to HR attributes. |
Lifecycle Management | Automate attributes and HR Data feeds to dynamically assign roles. |
Lifecycle Management | Automated approval workflow. |
Lifecycle Management | Assign role approval workflow for automatic and manual processes. |
Lifecycle Management | Assign roles based on HR attributes aligned to a role name. |
Lifecycle Management | Explicit role assignment. |
Lifecycle Management | Use external source for mappings of user attributes. |
Lifecycle Management | Leverage HR data to make decisions about role assignments as well as individual attributes. |
Lifecycle Management | Security policy monitoring, of SoD, role vs. actual, terminated users, out of compliance accounts. |
Lifecycle Management | One-click out-of-box reports of roles, privileges, identity management and IT audit reviews. |
Lifecycle Management | Audit and compliance IT controls of SoD, risks and entitlement violations. |
Lifecycle Management | Prohibit privilege requests that violate a SoD rule. |
Lifecycle Management | Apply risk scoring to individual entitlements. |
Lifecycle Management | Role model support for HR, ERP, enterprise applications. |
Lifecycle Management | Include entitlements from any connected system and assign roles based on HR attributes. |
Lifecycle Management | Model SoD controls on roles and entitlements. |
Lifecycle Management | Provide data for access reconciliation and response to changes made at target systems. |
Lifecycle Management | Internal reporting options include one-click defined reports, GUI audit tool and direct SQL connectivity. |
Lifecycle Management | Role entitlements and membership reports for business and assignment data. |
Lifecycle Management | Risk scoring and reporting associated with entitlements. |
Lifecycle Management | White pages/organization chart services for building an org chart. |
Lifecycle Management | Build roles from individual privileges and entitlements. |
Lifecycle Management | Complete user provisioning help desk ticketing system integration. |
Lifecycle Management | Evolve birthright roles and augmenting an IT Store and Shopping Cart as business job functions change. |
Lifecycle Management | Enforce concept of Least Privilege. |
Lifecycle Management | Detect Segregation of Duty (SoD) violations within and across applications. |
Lifecycle Management | Enforce segregation of duties (SoD) policies across multiple system types and privileges. |
Lifecycle Management | User ID correlation mapping to user accounts across multiple systems. |
Lifecycle Management | Calculates the ROI of self-service, automation and help desk ticketing. |
Lifecycle Management | One-click pre-packaged and filterable reports. |
Lifecycle Management | Role, rule, policy, SoD historical, tuning analysis analytics and intelligence. |
Lifecycle Management | Display role, rule, policy, SoD historical errors and conflicts. |
Lifecycle Management | Assign access based on business roles automatically or manually through the GUI and with workflow. |
IT Operations | Mine roles on user entitlements by platform, database or application for an unlimited number of systems. |
IT Operations | Import via csv files or natively from LDAP directories and cloud based subscription models. |
IT Operations | Mine entitlements for a role based on users that have access to that role. |
IT Operations | Mine entitlements for a role based on individual entitlements and cloud based subscriptions. |
IT Operations | Mine and report on business rules and exceptions, like inappropriate access and access different from peers. |
IT Operations | Mine entitlements for a role based on user population from directory data to find entitlement data. |
IT Operations | Top-down and bottom-up entitlement and role mining report on user and individual entitlements. |
IT Operations | Import roles, rules, entitlements and hierarchical attributes from csv extract files. |
IT Operations | Define roles based on user entitlement templates and capability to see drill-down to see users similar roles. |
IT Operations | Correlate HR attributes with a user's role using multiple directory attributes to define the role. |
IT Operations | Identity and access data model supports HR, ERP and enterprise applications with a standard data format. |
IT Security | Custom correlation using web based analytics with SQL scripting. |
IT Security | Audit trail of user access to applications based on entitlement data. |
Password Management | Enforce password security policies within and across applications. |