Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.

Description

Provide employees with the necessary applications and services while safeguarding data and processes from unauthorized access. Simplify the management and validation of user access through governance tools that automate user provisioning and ensure compliance with access certification for on-premise applications and data. By integrating preventive policy checks and monitoring emergency access, governance can be effectively enforced. Automatically detect and address access risk violations within SAP and external systems, while embedding compliance checks and essential risk mitigation into operational workflows. Facilitate user-initiated, workflow-oriented access requests and approvals, ensuring transparency and efficiency in the process. Accurately identify and resolve issues related to segregation of duties and critical access by incorporating integrated risk analysis. Streamline user access assignments across SAP and third-party systems automatically, while defining and maintaining compliance roles in clear, business-friendly terminology to enhance understanding and adherence. This comprehensive approach not only mitigates risks but also fosters a secure and efficient operational environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

7pace Timetracker
A10 Defend DDoS Mitigator
Adaptive Compliance Engine (ACE)
AssetCues
Brainwave GRC
Codeless Platforms BPA Platform
DeepStream
Exegy SMDS
GoodCompany
Instanta Facility
KENT CamAttendance
Krista
ManWinWin
SAP Joule
StarRez
Thrive Downtime Tracking Software
Tulip
eSupplier
in-STEP BLUE

Integrations

7pace Timetracker
A10 Defend DDoS Mitigator
Adaptive Compliance Engine (ACE)
AssetCues
Brainwave GRC
Codeless Platforms BPA Platform
DeepStream
Exegy SMDS
GoodCompany
Instanta Facility
KENT CamAttendance
Krista
ManWinWin
SAP Joule
StarRez
Thrive Downtime Tracking Software
Tulip
eSupplier
in-STEP BLUE

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

www.opentext.com/products/netiq-identity-manager

Vendor Details

Company Name

SAP

Founded

1972

Country

Germany

Website

www.sap.com/products/access-control.html

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Alternatives

EzyWine PRO Reviews

EzyWine PRO

Ezy Systems
Fischer Identity Reviews

Fischer Identity

Fischer International Identity
SPHEREboard Reviews

SPHEREboard

SPHERE Technology Solutions