Avatier Identity Management Software Suite (AIMS) delivers comprehensive Identity Governance and Administration (IGA) reporting capabilities. AIMS provides an automated reporting solution for IT audit reviews and compliance management reporting on demand.
AIMS | Description |
---|---|
AIMS | Compliance management, IT audit and reporting. |
AIMS | Regulatory compliance reporting. |
AIMS | FERPA regulatory compliance reporting. |
AIMS | FISMA regulatory compliance reporting. |
AIMS | FIPS 200 regulatory compliance reporting. |
AIMS | HIPAA HITECH regulatory compliance reporting. |
AIMS | NERC CIP regulatory compliance reporting. |
AIMS | NIST SP 800-53 regulatory compliance reporting. |
AIMS | PCS DSS regulatory compliance reporting. |
AIMS | SOX 302, 404 and 802 regulatory compliance reporting. |
AIMS | Predefined reports. |
AIMS | Save reports to PDF. |
Compliance Auditor | Attestation reports, i.e., who has access to what. |
Compliance Auditor | Attestation reports by hiring manager. |
Compliance Auditor | Attestation reports by target system owner. |
Compliance Auditor | Attestation reports by department and division. |
Compliance Auditor | Attestation reports by compliance officer. |
Compliance Auditor | Business manager attestation access certification audit capabilities. |
Compliance Auditor | Information security access risks. |
Compliance Auditor | Traceability reports, i.e., who accessed what. |
Compliance Auditor | Traceability reports by hiring manager. |
Compliance Auditor | Traceability reports by target system owner. |
Compliance Auditor | Traceability reports by department and division. |
Compliance Auditor | Traceability reports by compliance officer. |
Compliance Auditor | Management signoff of attestation exceptions. |
Compliance Auditor | Attestation exception reporting by hiring manager. |
Compliance Auditor | Attestation exception reporting by target system owner. |
Compliance Auditor | Attestation exception reporting by compliance officer. |
Compliance Auditor | Attestation exception reporting of access certification. |
Compliance Auditor | Attestation exception reporting of rejected. |
Compliance Auditor | Exception reporting of delegate access. |
Compliance Auditor | Access to core provisioning application workflow. |
Compliance Auditor | Privacy-centric reporting based on policy and rules. |
Compliance Auditor | Role exception reports. |
Compliance Auditor | Role based report views. |
Compliance Auditor | Email report packages. |
Compliance Auditor | SoD violations report. |
Group Enforcer | Group members. |
Group Enforcer | Group member exceptions. |
Group Enforcer | Group members added. |
Group Enforcer | Group members removed. |
Group Requester | Group owners. |
Group Requester | Group expiration dates. |
Group Requester | Groups added via self-service group management. |
Group Requester | Groups deleted using self-service group management. |
Identity Analyzer | Accounts Not used reports. |
Identity Analyzer | Accounts with passwords Not changed report. |
Identity Analyzer | IDs Not assigned to a role report. |
Identity Analyzer | IAM analytics, reporting, and trend analysis. |
Identity Enforcer | Predefined reports by users. |
Identity Enforcer | Predefined reports by target system. |
Identity Enforcer | Predefined reports by role. |
Identity Enforcer | Predefined reports by rule. |
Identity Enforcer | Predefined reports by location. |
Identity Enforcer | Predefined reports by policy. |
Identity Enforcer | Predefined reports by SoD rules. |
Identity Enforcer | Predefined reports by IT resources. |
Identity Enforcer | Predefined reports by approver. |
Identity Enforcer | Predefined reports by application. |
Identity Enforcer | Predefined reports by department and sub-departments. |
Identity Enforcer | Predefined reports by project. |
Identity Enforcer | Predefined reports by user type such as employees, contractors, partners and suppliers. |
Identity Enforcer | Predefined reports by manager. |
Identity Enforcer | Internal user provisioning product events log reports. |
Identity Enforcer | User access changes, adds and deletes. |
Identity Enforcer | Workflow management adds, changes and deletes. |
Identity Enforcer | Workflow execution actions. |
Identity Enforcer | Role management actions. |
Identity Enforcer | Rule management actions. |
Identity Enforcer | Product administrative changes. |
Identity Enforcer | Configuration changes. |
Identity Enforcer | Deployment changes. |
Identity Enforcer | Internal user provisioning product events log reports by role. |
Identity Enforcer | User access changes, adds and deletes by role. |
Identity Enforcer | Workflow management adds, changes and deletes by role. |
Identity Enforcer | Workflow execution actions by role. |
Identity Enforcer | Role management actions by role. |
Identity Enforcer | Rule management actions by role. |
Identity Enforcer | Product administrative changes by role. |
Identity Enforcer | Configuration changes by role. |
Identity Enforcer | Deployment changes by role. |
Identity Enforcer | Risk scores and thresholds exceeded. |
Identity Enforcer | InStore Intelligence reports. |
Password Station | Password accounts about to expire. |
Password Station | Self-service password account unlocks. |
Password Station | Phone password resets. |
Password Station | Unlock failures on remote login attempts. |
Password Station | Updated profiles. |
Password Station | Errors resetting passwords. |
Password Station | Initial enrollments. |
Password Station | Updated enrollments. |
Password Station | Users unenrolled. |
Password Station | Enrollment trends. |
Password Station | Password resets. |
Password Station | Self-service password management errors. |