The Avatier Identity Management Software Suite (AIMS) meets or exceeds most compliance regulations. AIMS minimizes IT governance risks from business users and system administrators with excessive role entitlements. Avatier identity management software ensures access certification compliance regardless of an enterprise's size, structure and complexity.
AIMS | Description |
---|---|
AIMS | Role life cycle management and access governance. |
AIMS | Import, aggregate and correlate user information and entitlements from any platform, database or application. |
AIMS | Import, aggregate and correlate user information from database and flat file imports. |
AIMS | Activity monitoring system of record with full audit trail support. |
AIMS | Certification dashboard to view certification status and historical trending. |
AIMS | Entitlement review reports and role assignment data reports. |
AIMS | FERPA compliance reporting: 99.32, 99.35, 99.38 and 99.62. |
AIMS | NIST 800-53 compliance reporting for: AU-3, AU-6, AU-7 and CA-2. |
AIMS | HIPAA compliance reporting: 164.308, 164.310, and 164.312. |
AIMS | NERC CIP compliance reporting 001 Unusual Access, 003 access certification and 007 Security Management. |
AIMS | PCI DSS compliance reporting of Requirement 2, 3, 6, 7, 8, 9 and 10. |
AIMS | SOX 302, 404 and 802 compliance reporting and audit controls. |
AIMS | Patented analytics engine. |
Compliance Auditor | Perform role, entitlement cleanup, modifications, and tune-ups at any time. |
Compliance Auditor | Perform access certification revoke at anytime to cleanup access and entitlements. |
Compliance Auditor | Perform role and access certification. |
Compliance Auditor | Certify role owners and business unit owners. |
Compliance Auditor | Role owners, managers or other assigned resources can certify existing access. |
Compliance Auditor | Role and entitlement attestation. |
Compliance Auditor | Enterprise-class access certification compliance management. |
Compliance Auditor | Role and entitlement remediation. |
Compliance Auditor | Immediate revocation or batch revocation after a certification audit is complete. |
Compliance Auditor | Account attestation and access certification for roles containing account-creation privileges. |
Identity Analyzer | Role discovery and mining. |
Identity Analyzer | Discover roles and entitlements for any platform, database or application. |
Identity Analyzer | Mine and derive role(s) from multiple sources. |
Identity Analyzer | Discover orphan accounts through report automation and alerts. |
Identity Analyzer | Create and maintain comprehensive identity data model. |
Identity Analyzer | Business reporting analytics engine. |
Identity Enforcer | Discover entitlements for role based on users that have access to that role. |
Identity Enforcer | Specify optional entitlements for a given role. |
Identity Enforcer | Risk assessment scoring applied to entitlements with in an IT Store and shopping cart. |
Identity Enforcer | Perform role administration. |
Identity Enforcer | Perform role approval, expiration and tuning activities at any time without interrupting workflow. |
Identity Enforcer | Delegate roles and entitlements at any level. |
Identity Enforcer | Map entitlements to HR attributes. |
Identity Enforcer | Automate attributes and HR Data feeds to dynamically assign roles. |
Identity Enforcer | Automated approval workflow. |
Identity Enforcer | Assign role approval workflow for automatic and manual processes. |
Identity Enforcer | Assign roles based on HR attributes aligned to a role name. |
Identity Enforcer | Explicit role assignment. |
Identity Enforcer | Use external source for mappings of user attributes. |
Identity Enforcer | Leverage HR data to make decisions about role assignments as well as individual attributes. |
Identity Enforcer | Security policy monitoring, of SoD, role vs. actual, terminated users, out of compliance accounts. |
Identity Enforcer | One-click out-of-box reports of roles, privileges, identity management and IT audit reviews. |
Identity Enforcer | Audit and compliance IT controls of SoD, risks and entitlement violations. |
Identity Enforcer | Prohibit privilege requests that violate a SoD rule. |
Identity Enforcer | Apply risk scoring to individual entitlements. |
Identity Enforcer | Role model support for HR, ERP, enterprise applications. |
Identity Enforcer | Include entitlements from any connected system and assign roles based on HR attributes. |
Identity Enforcer | Model SoD controls on roles and entitlements. |
Identity Enforcer | Provide data for access reconciliation and response to changes made at target systems. |
Identity Enforcer | Internal reporting options include one-click defined reports, GUI audit tool and direct SQL connectivity. |
Identity Enforcer | Role entitlements and membership reports for business and assignment data. |
Identity Enforcer | Risk scoring and reporting associated with entitlements. |
Identity Enforcer | White pages/organization chart services for building an org chart. |
Identity Enforcer | Build roles from individual privileges and entitlements. |
Identity Enforcer | Complete user provisioning help desk ticketing system integration. |
Identity Enforcer | Evolve birthright roles and augmenting an IT Store and Shopping Cart as business job functions change. |
Identity Enforcer | Enforce concept of Least Privilege. |
Identity Enforcer | Detect Segregation of Duty (SoD) violations within and across applications. |
Identity Enforcer | Enforce segregation of duties (SoD) policies across multiple system types and privileges. |
Identity Enforcer | User ID correlation mapping to user accounts across multiple systems. |
Identity Enforcer | Calculates the ROI of self-service, automation and help desk ticketing. |
Identity Enforcer | One-click pre-packaged and filterable reports. |
Identity Enforcer | Role, rule, policy, SoD historical, tuning analysis analytics and intelligence. |
Identity Enforcer | Display role, rule, policy, SoD historical errors and conflicts. |
Identity Enforcer | Assign access based on business roles automatically or manually through the GUI and with workflow. |
IT Operations | Mine roles on user entitlements by platform, database or application for an unlimited number of systems. |
IT Operations | Import via csv files or natively from LDAP directories and cloud based subscription models. |
IT Operations | Mine entitlements for a role based on users that have access to that role. |
IT Operations | Mine entitlements for a role based on individual entitlements and cloud based subscriptions. |
IT Operations | Mine and report on business rules and exceptions, like inappropriate access and access different from peers. |
IT Operations | Mine entitlements for a role based on user population from directory data to find entitlement data. |
IT Operations | Top-down and bottom-up entitlement and role mining report on user and individual entitlements. |
IT Operations | Import roles, rules, entitlements and hierarchical attributes from csv extract files. |
IT Operations | Define roles based on user entitlement templates and capability to see drill-down to see users similar roles. |
IT Operations | Correlate HR attributes with a user's role using multiple directory attributes to define the role. |
IT Operations | Identity and access data model supports HR, ERP and enterprise applications with a standard data format. |
IT Security | Custom correlation using web based analytics with SQL scripting. |
IT Security | Audit trail of user access to applications based on entitlement data. |
Password Station | Enforce password security policies within and across applications. |