Gartner Magic Quadrant IGA Compliance, Audit and Reporting
Holistic Identity Management Reporting Out-of-the-Box
Avatier Identity Management Software Suite (AIMS) delivers comprehensive Identity Governance and Administration (IGA) reporting capabilities. AIMS provides an automated reporting solution for IT audit reviews and compliance management reporting on demand.
Avatier Identity Management Suite (AIMS) IGA Compliance, Audit and Reporting
AIMS | Description |
---|---|
AIMS | Compliance management, IT audit and reporting. |
AIMS | Regulatory compliance reporting. |
AIMS | FERPA regulatory compliance reporting. |
AIMS | FISMA regulatory compliance reporting. |
AIMS | FIPS 200 regulatory compliance reporting. |
AIMS | HIPAA HITECH regulatory compliance reporting. |
AIMS | NERC CIP regulatory compliance reporting. |
AIMS | NIST SP 800-53 regulatory compliance reporting. |
AIMS | PCS DSS regulatory compliance reporting. |
AIMS | SOX 302, 404 and 802 regulatory compliance reporting. |
AIMS | Predefined reports. |
AIMS | Save reports to PDF. |
Access Governance | Attestation reports, i.e., who has access to what. |
Access Governance | Attestation reports by hiring manager. |
Access Governance | Attestation reports by target system owner. |
Access Governance | Attestation reports by department and division. |
Access Governance | Attestation reports by compliance officer. |
Access Governance | Business manager attestation access certification audit capabilities. |
Access Governance | Information security access risks. |
Access Governance | Traceability reports, i.e., who accessed what. |
Access Governance | Traceability reports by hiring manager. |
Access Governance | Traceability reports by target system owner. |
Access Governance | Traceability reports by department and division. |
Access Governance | Traceability reports by compliance officer. |
Access Governance | Management signoff of attestation exceptions. |
Access Governance | Attestation exception reporting by hiring manager. |
Access Governance | Attestation exception reporting by target system owner. |
Access Governance | Attestation exception reporting by compliance officer. |
Access Governance | Attestation exception reporting of access certification. |
Access Governance | Attestation exception reporting of rejected. |
Access Governance | Exception reporting of delegate access. |
Access Governance | Access to core provisioning application workflow. |
Access Governance | Privacy-centric reporting based on policy and rules. |
Access Governance | Role exception reports. |
Access Governance | Role based report views. |
Access Governance | Email report packages. |
Access Governance | SoD violations report. |
Group Automation | Group members. |
Group Automation | Group member exceptions. |
Group Automation | Group members added. |
Group Automation | Group members removed. |
Group Self-Service | Group owners. |
Group Self-Service | Group expiration dates. |
Group Self-Service | Groups added via self-service group management. |
Group Self-Service | Groups deleted using self-service group management. |
Identity Analyzer | Accounts Not used reports. |
Identity Analyzer | Accounts with passwords Not changed report. |
Identity Analyzer | IDs Not assigned to a role report. |
Identity Analyzer | IAM analytics, reporting, and trend analysis. |
Lifecycle Management | Predefined reports by users. |
Lifecycle Management | Predefined reports by target system. |
Lifecycle Management | Predefined reports by role. |
Lifecycle Management | Predefined reports by rule. |
Lifecycle Management | Predefined reports by location. |
Lifecycle Management | Predefined reports by policy. |
Lifecycle Management | Predefined reports by SoD rules. |
Lifecycle Management | Predefined reports by IT resources. |
Lifecycle Management | Predefined reports by approver. |
Lifecycle Management | Predefined reports by application. |
Lifecycle Management | Predefined reports by department and sub-departments. |
Lifecycle Management | Predefined reports by project. |
Lifecycle Management | Predefined reports by user type such as employees, contractors, partners and suppliers. |
Lifecycle Management | Predefined reports by manager. |
Lifecycle Management | Internal user provisioning product events log reports. |
Lifecycle Management | User access changes, adds and deletes. |
Lifecycle Management | Workflow management adds, changes and deletes. |
Lifecycle Management | Workflow execution actions. |
Lifecycle Management | Role management actions. |
Lifecycle Management | Rule management actions. |
Lifecycle Management | Product administrative changes. |
Lifecycle Management | Configuration changes. |
Lifecycle Management | Deployment changes. |
Lifecycle Management | Internal user provisioning product events log reports by role. |
Lifecycle Management | User access changes, adds and deletes by role. |
Lifecycle Management | Workflow management adds, changes and deletes by role. |
Lifecycle Management | Workflow execution actions by role. |
Lifecycle Management | Role management actions by role. |
Lifecycle Management | Rule management actions by role. |
Lifecycle Management | Product administrative changes by role. |
Lifecycle Management | Configuration changes by role. |
Lifecycle Management | Deployment changes by role. |
Lifecycle Management | Risk scores and thresholds exceeded. |
Lifecycle Management | InStore Intelligence reports. |
Password Management | Password accounts about to expire. |
Password Management | Self-service password account unlocks. |
Password Management | Phone password resets. |
Password Management | Unlock failures on remote login attempts. |
Password Management | Updated profiles. |
Password Management | Errors resetting passwords. |
Password Management | Initial enrollments. |
Password Management | Updated enrollments. |
Password Management | Users unenrolled. |
Password Management | Enrollment trends. |
Password Management | Password resets. |
Password Management | Self-service password management errors. |