Shared architecture to meet regulatory requirements:

  • Externalize administration and governance of identities and entitlements.
  • User-centric, not application-centric processes.

Authentication

Authorization

Audit

Infrastructure

  • Password management.
  • Federation.
  • Multi-factor login.
  • Privileged access management.

  • Automatic deactivation.
  • SoD policy enforcement.
  • Request forms, approvals workflow.

  • ID mapping.
  • Access certification, remediation.
  • Analytics reports.

  • Perimeter defense.
  • Anti-malware.
  • DLP.
  • SIEM.