Why AvatierProductsSolutionsCustomersPartners
PricingRequest DemoResourcesSupport(925) 217-5170
Identity Enforcer
At Last a Service Catalog in an IT Store
The world's first IT store for access risk management.
IT Store
1-click shopping for IT access, assets, apps, and more.
Self-Service Requests
Returning Identity Access Management to users.
Automatic Workflow
Secure effortless control of your resources.
Asset Budgeting
Allow workers to shop with IT provisioning flexibility.
Push Notification
Priority alerts immediately at your fingertips.
Identity
Enforcer
IT Store
Shopping
Self-Service
Requests
Automatic
Workflow
Asset
Budgeting
Push
Notification
Identity Enforcer

At Last a Service Catalog in an IT Store

The world's first IT store for access risk management.

Transform your IT service catalog and business operations. Enable user provisioning and access management through an actionable service catalog IT store. Streamline routine IT operations through business user self-service and workflow automation.

Features

IT Store IT Service Catalog

Identity management software as easy as shopping online

Identity Enforcer shocked the world with its user provisioning shopping model and IT service catalog administration ease. Identity Enforcer lets you request and receive approval for the access, assets, and tools you need to do your jobs without hassle. You cannot manage what you cannot see is an IT paradox. Identity Enforcer's self-service provisioning through an IT Store is the most significant innovation in identity and access management this century.

Because, it is now possible for your IT staff to see and index everything they manage through a graphical ITIL service catalog. Best of all, Identity Enforcer's actionable service catalog comes fully integrated with Avatier's complete identity access management software suite. Identity Enforcer represents a complete paradigm shift. Its self-service IAM capabilities with automated user provisioning workflow make asset allocation, access provisioning, and the entire user provisioning process as easy as shopping online.

Automated User Provisioning

User provisioning accountability where it belongs

We started by inventing the IT Store with self-service provisioning to streamline operations and eliminate delays in user account provisioning. Then we patented our automated user provisioning workflow along with our validation access management software.

With workflow automation part of the IT store framework, our user provisioning self-service catalog puts accountability in the hands of trusted business users rather than IT staff. Our automated workflow lets everyone 'shop' for resources while giving the appropriate management control over approvals so provisioning transactions works just like shopping online.

Asset Budgeting Asset Management

Control IT service catalog spending

Identity Enforcer not only revolutionizes identity and access management with the IT Store and workflow automation, but it also delivers asset budgeting with built-in audit controls. Asset Budgeting keeps a running tally of all assigned IT service catalog asset requests against a budget.

As your shopping cart fills up, it's checked against your budget balance so everyone can manage their assets according to plan, while knowing your choices and available budget. With Identity Enforcer budgets are assigned to organizational units, groups or even specific users. Asset Budgeting allows ITIL service catalog user provisioning flexibility while enforcing a budget you set.

Self-Service Provisioning Requests

Give user provisioning back to the business

The IT Store is a whole new way for people to request user provisioning access, assets, applications, assignments, and more. Identity Enforcer rightfully returns identity and access management to business users through self-service provisioning and an actionable service catalog.

Identity Enforcer makes operations more efficient. It provides you visibility into the user accounts, privileges, and budgets of the people you manage. You can now solve almost any identity management user provisioning process issue with automated user provisioning and the IT Store.

User Provisioning Push Notifications

Real time user provisioning and access management alerts

Identity Enforcer logs all identity and access management transactions. It records a complete audit trail, while providing scheduled, event triggered, and real-time reports.

Identity Enforcer's push notification alerts let you proactively monitor your network for added, disabled, and removed accounts. Push notifications provide priority cyber security alerts immediately to your attention.

Terminations and De-provisioning

Automate user access, transfers and terminations

Upon termination, Identity Enforcer's user provisioning system automatically deprovisions users by removing their access across all your systems.

Additionally, without custom programming Identity Enforcer does the following:

  • Move a user to a disabled or deleted organizational uni
  • Archive a user's exchange 2003/2007/2010 mailbox
  • Compress and move a user's home directory and home share
  • Run custom actions to complete your user provisioning solution

When managing an employee's user provisioning life cycle, eliminate your IT security concerns. Simplify your audits today and save with Identity Enforcer.

Dynamic Identity Management UI

Self service provisioning business attributes

We knew inventing an IT Store with automated user provisioning workflow would revolutionize access provisioning, asset management, and assignment management. We thought how can we take the best identity and access management solution and make it even easier for everyone to use?

With business users in mind, we then built the world's first dynamic ITIL service catalog user interface into our IT Store. Dynamic UI allows organizations to dynamically customize and limit everyone's view into their IT Store based on business attributes like department, location, title, and more.

Identity Enforcer gives you user provisioning software with a customizable user interface controls delivered without programming or rules creation. It does not get any better.

User Provisioning Shortcuts

User provisioning workflow automation

Shortcuts make fast integration to common identity management tasks possible. They allow for easy integration with internal websites and systems, external services, and cloud computing. Shortcuts let you specify the web sites appearing on your startup page. By the same token, deep linking support lets you control the user identity management tasks displayed at startup and throughout the session.

IT Service Catalog User Provisioning

IT Service Catalog User Provisioning

IT store with automated user provisioning workflow

Avatier Identity Enforcer is the world's first IT store for self-service provisioning and automated user provisioning workflow. With Identity Enforcer business users can request and receive access to the assets and applications they need via Avatier's access management software.

Through the IT Store, business users can request and receive provisioning as easy as shopping online. With the world's first IT store, this user provisioning software can automate the most common user account provisioning tasks, which frees IT staff to focus on more critical IT security threats.

Identity Enforcer deprovisions as well with audit controls for managing terminations. Upon termination, Identity Enforcer automatically disables access provisioning across all systems ensuring a company is safeguarded against IT security and compliance risks.