Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc

Description

Versatile and adaptable tools for overseeing and controlling systems, handling user accounts, and conducting security audits are consolidated into a single interface, compatible with Windows, UNIX/Linux, OpenVMS, and IBM platforms. The SEM framework encompasses three essential modules: Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM), and Sysgem File Synchronizer (SFiS), all designed to operate seamlessly together. This integration allows for the unification, simplification, and enhancement of core system administration tasks within a diverse multi-platform landscape. It streamlines user account management across various platforms and applications, facilitating a more cohesive administration process. Furthermore, it enables the efficient distribution and implementation of configuration files throughout the infrastructure, ensuring consistency and control. By leveraging these tools, organizations can significantly improve their operational efficiency and security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Dropbox
Microsoft 365
Microsoft Azure
Microsoft Dynamics 365
Oracle Database
SAP BusinessObjects Business Intelligence
SAP HANA
ServiceNow
Workday HCM

Integrations

Active Directory
Dropbox
Microsoft 365
Microsoft Azure
Microsoft Dynamics 365
Oracle Database
SAP BusinessObjects Business Intelligence
SAP HANA
ServiceNow
Workday HCM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$200 per user per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Deep Identity

Founded

2009

Country

Singapore

Website

deepidentity.com

Vendor Details

Company Name

Sysgem

Founded

1998

Country

Switzerland

Website

www.sysgem.com

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Database Monitoring

Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting

File Sync

Audit Trail
Backup and Recovery
Conflict Detection
Real Time Synchronization
Remote Synchronization
Synchronization Scheduling
Two-Way Synchronization

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Symantec IGA Reviews

Symantec IGA

Broadcom

Alternatives

Clear Skye IGA Reviews

Clear Skye IGA

Clear Skye
Site24x7 Reviews

Site24x7

ManageEngine
Ilantus Compact Identity Reviews

Ilantus Compact Identity

Ilantus Technologies