Avatier Identity Management Suite (AIMS) 9.5
AIMS 9.5 makes enterprises more efficient and secure than ever.
AIMS now features short message service (SMS) for two-factor authentication without smart cards, tokens and securID.
AIMS Updates
AIMS | Description |
---|---|
AIMS | Aggregate risk score and risk radar show a user's risk in context to your organization and the request. |
AIMS | IIS optimization boosts application performance tenfold. |
AIMS | Enhanced access controls let you better manage your AIMS configuration. |
AIMS | Manage your Office 365 instance the same as an on-premise Exchange environment. |
AIMS | New branding configuration allows you to apply custom style sheets per AIMS module. |
AIMS | Improved performance for user collection as well as extended attribute collection. |
AIMS | Connector monitoring ensures connectors are running and sends an alert when a connector is down. |
AIMS | HTML based email templates. |
AIMS | Complete LANDesk web service ticketing integration. |
AIMS | Improved grid search capabilities across the AIMS configuration suite, including the Approver and Workflow Administrator screens. |
AIMS | New tree controls boosts UI configuration performance |
AIMS | Custom 1-Click report capabilities allow you to run reports based on customer-specific requirements. |
AIMS | Enhanced AIMS configuration and usage analytics reporting. |
AIMS | New connectors for Custom Scripting Connector, GENBAND, McAfee End Point Encryption, Microsoft Lync, Office 365, and SuccessFactors.com. |
Password Management Enhancements
AIMS | Description |
---|---|
Password Management | SMS authentication allows users secondary authentication via SMS notification |
Password Management | SMS authentication integration with Help Desk systems |
Password Management | SMS phone number verification during enrollment process |
Password Management | SMS configuration for carrier based, a paid for SMS solution, or in-house SMS solutions |
Password Management | Multiple questions for Help Desk to verify employee identity |
Lifecycle Management Enhancements
AIMS | Description |
---|---|
Lifecycle Management | Store intelligence visually presents information about the items in your business service catalog and IT store, such as the number of requests for an item, how long fulfillment takes and risks. |
Lifecycle Management | Service catalog risk scoring assigns risk scores to your systems, access privileges and user accounts to give a holistic view of a user's risk in your environment. |
Lifecycle Management | Multi-grantor functionality enables multiple levels of grantors required to perform actions on requests for assets and access to virtual systems. |
Lifecycle Management | Dynamic delegation based on complex hierarchies. |
Lifecycle Management | Quick links directly from the Approver and Workflow administrator screens to Identity Enforcer. |
Lifecycle Management | Quick links to the In Process, Access Request and Request History screens give you the details related to virtual and asset privileges. |
Lifecycle Management | Multi-request capabilities let you manage multiple direct reports with a single request. |
Lifecycle Management | Bulk cart requests provide the ability to submit multiple requests from a command line tool using a CSV file without having to manually make requests. |
Lifecycle Management | HR feed write back allows a stored procedure to update data in your feed and push data to other databases. |
Lifecycle Management | User Favorites empowers users to set items as favorites for quick access to their most requested items. |
Lifecycle Management | Business service catalog images stored in a database allow for inheritance from a parent container. |
Lifecycle Management | Segregation Of Duties (SOD) across privileges and roles. |
Lifecycle Management | When deleting AD Users with nodes underneath them, delete their sub-nodes so you can remove the users. |
Lifecycle Management | Discard all Identity Enforcer role and privilege assignments on Delete. |
Lifecycle Management | Keep removal requests for grantor when an Enrollment Account is deleted. |
Lifecycle Management | Remove non-primary Active Directory groups on Disable. |
Lifecycle Management | Cancel Identity Enforcer requests when authoritative source user is disabled. |
Lifecycle Management | Remove Active Directory Mail, Division, Manager, Webpage and Phone Number Attribute on Disable. |
Lifecycle Management | Revoke virtual privileges and assets when an Enrollment Account is Disabled |
Lifecycle Management | Import data collected by Identity Analyzer into Identity Enforcer and Service Catalog. |
Lifecycle Management | Improved performance for the optimized handling large volumes of data. |
Access Governance Enhancements
AIMS | Description |
---|---|
Access Governance | Compliance intelligence delivers analytics associated to open and assigned projects for better decision-making. |
Access Governance | Compliance intelligence integration with Identity Enforcer and Service Catalog risk scoring. |
Access Governance | Reassign an object when someone else should perform it. |
Access Governance | Delta audits streamline repetitive audits by performing audit activities on what changed. |
Access Governance | Scheduled audits let you schedule recurring audit projects on a regular basis. |
Access Governance | Employee certification allows for employee self-certification whenever they need access assigned. |
Access Governance | Manager certification gives managers the ability to audit and validate access for their direct reports. |
Access Governance | Project diagnostic tracker lets project owners troubleshoot the collection status of their projects |
Identity Analyzer Enhancements
AIMS | Description |
---|---|
Identity Analyzer | Improved performance collection processes. |
Identity Analyzer | Import data collected by Identity Analyzer into Identity Enforcer and Service Catalog. |