Identity and Access Management - Features

Key Features of Security Detective include:

  • Bring together all IT system access information into one central repository.
     

  • Review the design of system access to help assess the adequacy of segregation of duties controls.
     

  • Review and certify the continued business requirement for access by system or department.
     

  • Identify differences between actual system access rights and those authorised.
     

  • Highlight redundant or orphaned user accounts at a glance.  Identify user accounts to be disabled before someone leaves the company, and incorporate actions into the leaver process.
     

  • Security Detective is completely non-intrusive.  There is no software to be installed on your corporate systems and therefore nothing that can slow the performance or damage the configuration.
     

  • Security Detective provides complete flexibility in reporting as output can be exported to popular packages such as Microsoft Excel for further analysis or incorporation into your standard corporate presentations and documents.