Gartner Magic Quadrant IGA Role Management

Unify role life cycle management and access governance across your enterprise

The Avatier Identity Management Software Suite (AIMS) meets or exceeds most compliance regulations. AIMS minimizes IT governance risks from business users and system administrators with excessive role entitlements. Avatier identity management software ensures access certification compliance regardless of an enterprise’s size, structure and complexity.

Avatier Identity Management Suite (AIMS) IGA Role Management

AIMSDescription
AIMS

Role life cycle management and access governance.

AIMS

Import, aggregate and correlate user information and entitlements from any platform, database or application.

AIMS

Import, aggregate and correlate user information from database and flat file imports.

AIMS

Activity monitoring system of record with full audit trail support.

AIMS

Certification dashboard to view certification status and historical trending.

AIMS

Entitlement review reports and role assignment data reports.

AIMS

FERPA compliance reporting: 99.32, 99.35, 99.38 and 99.62.

AIMS

NIST 800-53 compliance reporting for: AU-3, AU-6, AU-7 and CA-2.

AIMS

HIPAA compliance reporting: 164.308, 164.310, and 164.312.

AIMS

NERC CIP compliance reporting 001 Unusual Access, 003 access certification and 007 Security Management.

AIMS

PCI DSS compliance reporting of Requirement 2, 3, 6, 7, 8, 9 and 10.

AIMS

SOX 302, 404 and 802 compliance reporting and audit controls.

AIMS

Patented analytics engine.

Access Governance

Perform role, entitlement cleanup, modifications, and tune-ups at any time.

Access Governance

Perform access certification revoke at anytime to cleanup access and entitlements.

Access Governance

Perform role and access certification.

Access Governance

Certify role owners and business unit owners.

Access Governance

Role owners, managers or other assigned resources can certify existing access.

Access Governance

Role and entitlement attestation.

Access Governance

Enterprise-class access certification compliance management.

Access Governance

Role and entitlement remediation.

Access Governance

Immediate revocation or batch revocation after a certification audit is complete.

Access Governance

Account attestation and access certification for roles containing account-creation privileges.

Identity Analyzer

Role discovery and mining.

Identity Analyzer

Discover roles and entitlements for any platform, database or application.

Identity Analyzer

Mine and derive role(s) from multiple sources.

Identity Analyzer

Discover orphan accounts through report automation and alerts.

Identity Analyzer

Create and maintain comprehensive identity data model.

Identity Analyzer

Business reporting analytics engine.

Lifecycle Management

Discover entitlements for role based on users that have access to that role.

Lifecycle Management

Specify optional entitlements for a given role.

Lifecycle Management

Risk assessment scoring applied to entitlements with in an IT Store and shopping cart.

Lifecycle Management

Perform role administration.

Lifecycle Management

Perform role approval, expiration and tuning activities at any time without interrupting workflow.

Lifecycle Management

Delegate roles and entitlements at any level.

Lifecycle Management

Map entitlements to HR attributes.

Lifecycle Management

Automate attributes and HR Data feeds to dynamically assign roles.

Lifecycle Management

Automated approval workflow.

Lifecycle Management

Assign role approval workflow for automatic and manual processes.

Lifecycle Management

Assign roles based on HR attributes aligned to a role name.

Lifecycle Management

Explicit role assignment.

Lifecycle Management

Use external source for mappings of user attributes.

Lifecycle Management

Leverage HR data to make decisions about role assignments as well as individual attributes.

Lifecycle Management

Security policy monitoring, of SoD, role vs. actual, terminated users, out of compliance accounts.

Lifecycle Management

One-click out-of-box reports of roles, privileges, identity management and IT audit reviews.

Lifecycle Management

Audit and compliance IT controls of SoD, risks and entitlement violations.

Lifecycle Management

Prohibit privilege requests that violate a SoD rule.

Lifecycle Management

Apply risk scoring to individual entitlements.

Lifecycle Management

Role model support for HR, ERP, enterprise applications.

Lifecycle Management

Include entitlements from any connected system and assign roles based on HR attributes.

Lifecycle Management

Model SoD controls on roles and entitlements.

Lifecycle Management

Provide data for access reconciliation and response to changes made at target systems.

Lifecycle Management

Internal reporting options include one-click defined reports, GUI audit tool and direct SQL connectivity.

Lifecycle Management

Role entitlements and membership reports for business and assignment data.

Lifecycle Management

Risk scoring and reporting associated with entitlements.

Lifecycle Management

White pages/organization chart services for building an org chart.

Lifecycle Management

Build roles from individual privileges and entitlements.

Lifecycle Management

Complete user provisioning help desk ticketing system integration.

Lifecycle Management

Evolve birthright roles and augmenting an IT Store and Shopping Cart as business job functions change.

Lifecycle Management

Enforce concept of Least Privilege.

Lifecycle Management

Detect Segregation of Duty (SoD) violations within and across applications.

Lifecycle Management

Enforce segregation of duties (SoD) policies across multiple system types and privileges.

Lifecycle Management

User ID correlation mapping to user accounts across multiple systems.

Lifecycle Management

Calculates the ROI of self-service, automation and help desk ticketing.

Lifecycle Management

One-click pre-packaged and filterable reports.

Lifecycle Management

Role, rule, policy, SoD historical, tuning analysis analytics and intelligence.

Lifecycle Management

Display role, rule, policy, SoD historical errors and conflicts.

Lifecycle Management

Assign access based on business roles automatically or manually through the GUI and with workflow.

IT Operations

Mine roles on user entitlements by platform, database or application for an unlimited number of systems.

IT Operations

Import via csv files or natively from LDAP directories and cloud based subscription models.

IT Operations

Mine entitlements for a role based on users that have access to that role.

IT Operations

Mine entitlements for a role based on individual entitlements and cloud based subscriptions.

IT Operations

Mine and report on business rules and exceptions, like inappropriate access and access different from peers.

IT Operations

Mine entitlements for a role based on user population from directory data to find entitlement data.

IT Operations

Top-down and bottom-up entitlement and role mining report on user and individual entitlements.

IT Operations

Import roles, rules, entitlements and hierarchical attributes from csv extract files.

IT Operations

Define roles based on user entitlement templates and capability to see drill-down to see users similar roles.

IT Operations

Correlate HR attributes with a user's role using multiple directory attributes to define the role.

IT Operations

Identity and access data model supports HR, ERP and enterprise applications with a standard data format.

IT Security

Custom correlation using web based analytics with SQL scripting.

IT Security

Audit trail of user access to applications based on entitlement data.

Password Management

Enforce password security policies within and across applications.