AIMS now features short message service (SMS) for two-factor authentication without smart cards, tokens and securID.
AIMS | Description |
---|---|
AIMS | Aggregate risk score and risk radar show a user's risk in context to your organization and the request. |
AIMS | IIS optimization boosts application performance tenfold. |
AIMS | Enhanced access controls let you better manage your AIMS configuration. |
AIMS | Manage your Office 365 instance the same as an on-premise Exchange environment. |
AIMS | New branding configuration allows you to apply custom style sheets per AIMS module. |
AIMS | Improved performance for user collection as well as extended attribute collection. |
AIMS | Connector monitoring ensures connectors are running and sends an alert when a connector is down. |
AIMS | HTML based email templates. |
AIMS | Complete LANDesk web service ticketing integration. |
AIMS | Improved grid search capabilities across the AIMS configuration suite, including the Approver and Workflow Administrator screens. |
AIMS | New tree controls boosts UI configuration performance |
AIMS | Custom 1-Click report capabilities allow you to run reports based on customer-specific requirements. |
AIMS | Enhanced AIMS configuration and usage analytics reporting. |
AIMS | New connectors for Custom Scripting Connector, GENBAND, McAfee End Point Encryption, Microsoft Lync, Office 365, and SuccessFactors.com. |
Password Station | Description |
---|---|
Password Station | SMS authentication allows users secondary authentication via SMS notification |
Password Station | SMS authentication integration with Help Desk systems |
Password Station | SMS phone number verification during enrollment process |
Password Station | SMS configuration for carrier based, a paid for SMS solution, or in-house SMS solutions |
Password Station | Multiple questions for Help Desk to verify employee identity |
Identity Enforcer | Description |
---|---|
Identity Enforcer | Store intelligence visually presents information about the items in your business service catalog and IT store, such as the number of requests for an item, how long fulfillment takes and risks. |
Identity Enforcer | Service catalog risk scoring assigns risk scores to your systems, access privileges and user accounts to give a holistic view of a user's risk in your environment. |
Identity Enforcer | Multi-grantor functionality enables multiple levels of grantors required to perform actions on requests for assets and access to virtual systems. |
Identity Enforcer | Dynamic delegation based on complex hierarchies. |
Identity Enforcer | Quick links directly from the Approver and Workflow administrator screens to Identity Enforcer. |
Identity Enforcer | Quick links to the In Process, Access Request and Request History screens give you the details related to virtual and asset privileges. |
Identity Enforcer | Multi-request capabilities let you manage multiple direct reports with a single request. |
Identity Enforcer | Bulk cart requests provide the ability to submit multiple requests from a command line tool using a CSV file without having to manually make requests. |
Identity Enforcer | HR feed write back allows a stored procedure to update data in your feed and push data to other databases. |
Identity Enforcer | User Favorites empowers users to set items as favorites for quick access to their most requested items. |
Identity Enforcer | Business service catalog images stored in a database allow for inheritance from a parent container. |
Identity Enforcer | Segregation Of Duties (SOD) across privileges and roles. |
Identity Enforcer | When deleting AD Users with nodes underneath them, delete their sub-nodes so you can remove the users. |
Identity Enforcer | Discard all Identity Enforcer role and privilege assignments on Delete. |
Identity Enforcer | Keep removal requests for grantor when an Enrollment Account is deleted. |
Identity Enforcer | Remove non-primary Active Directory groups on Disable. |
Identity Enforcer | Cancel Identity Enforcer requests when authoritative source user is disabled. |
Identity Enforcer | Remove Active Directory Mail, Division, Manager, Webpage and Phone Number Attribute on Disable. |
Identity Enforcer | Revoke virtual privileges and assets when an Enrollment Account is Disabled |
Identity Enforcer | Import data collected by Identity Analyzer into Identity Enforcer and Service Catalog. |
Identity Enforcer | Improved performance for the optimized handling large volumes of data. |
Compliance Auditor | Description |
---|---|
Compliance Auditor | Compliance intelligence delivers analytics associated to open and assigned projects for better decision-making. |
Compliance Auditor | Compliance intelligence integration with Identity Enforcer and Service Catalog risk scoring. |
Compliance Auditor | Reassign an object when someone else should perform it. |
Compliance Auditor | Delta audits streamline repetitive audits by performing audit activities on what changed. |
Compliance Auditor | Scheduled audits let you schedule recurring audit projects on a regular basis. |
Compliance Auditor | Employee certification allows for employee self-certification whenever they need access assigned. |
Compliance Auditor | Manager certification gives managers the ability to audit and validate access for their direct reports. |
Compliance Auditor | Project diagnostic tracker lets project owners troubleshoot the collection status of their projects |
Identity Analyzer | Description |
---|---|
Identity Analyzer | Improved performance collection processes. |
Identity Analyzer | Import data collected by Identity Analyzer into Identity Enforcer and Service Catalog. |