Identity Warehouse
Build your identity warehouse from all both cloud and on-premise applications.
Fuzzy ID
SCC invented the Fuzzy ID to identify users so you don’t need a single source of record.
Customized Review Layout
One-click user access reviews fully-customized to deliver user access reviews YOUR way
Evidence of Compliance
All evidence of identity access review compliance saved in one place forever.
Powerful Governance Features
Powerful governance features like alerting on changes, separation of duties, and discovering terminated users.
Role-Based Access Reviews
Role-Mining capability to enable role-based access reviews and provisioning.
Automate User Access Reviews
Stop the spreadsheet rodeo and succeed with our easy-to use access review solution.
- Access Certification: Automate user access reviews with an easy-to-use web-based solution.
- Workflow Engine: Flexible rules-based workflows allow for managers, business owners, and others to approve or deny the rights assigned to their users, and initiate remediation as necessary.
- Compliance Reporting: Records of all reviews are saved for instant audit and compliance reporting.
- Identity Warehouse: Single pane of glass view into who has access to what.
Fuzzy ID
The Fuzzy ID discovers and links users from disparate systems with no common login ID or unique identifier.
- Discover Users: Link users from disparate applications even when no consistent login ID exists.
- AI Algorithm: Proprietary name-matching algorithms automatically identify the same user in multiple systems even with no common attribute.
- Save Time and Effort: Eliminates the need to modify applications to insert a unique identifier.
- Single View of Truth: Establishes a single repository of all access data across the entire enterprise.
Manage Cloud Access Rights
Access Auditor combines access rights for both in-house and cloud applications within a single product.
- Single Identity Warehouse: Provide one identity data warehouse for all users and all applications regardless of location.
- Automation Everywhere: Automate user access for all cloud and on-premise applications.
- Fast Setup: One-click setup to start user access reviews on all web applications.
- Changes in the Cloud: Monitor for changes and cross-application separation of duties.
Role-Based Compliance and Reporting
Perform role-based entitlement reviews that highlight privileges users have outside of their pre-approved roles.
- Role Mining: Define roles and role memberships with Role Mining.
- Role-Based Reviews: Perform certifications by roles and exceptions to improve accuracy and relevance.
- Model Changes: Perform what-if scenarios to define cross-application enterprise roles.
- Improve Access Review Accuracy: Improve relevance of certifications by reviewing a handful of roles instead of hundreds of privileges.
- Manage Role-Based Access: Define and manage roles by comparing role memberships and exceptions.
Alert on Changes to Risky Privileges
Access Auditor monitors and alerts on changes in sensitive roles or privileges.
- Change Monitoring: Every data element is monitored for changes on a scheduled basis.
- Simple Setup: Simple interface for configuring custom alerts and actions.
- Unlimited Alerts: Generates alerts if user or access data has changed since the last audit scan.
- Detects Unauthorized Changes: Detects unauthorized changes to systems.
Enforce Separation of Duties
Define and manage cross-application separation of duties (SOD) rules, and receive alerts and reports on violations.
- Cross-Application: Create cross-application privilege conflict rules.
- Prevent Fraud: Prevent fraud by limiting excessive privileges.
- Report on Violations: Report on violations to policies and enforce key SOD compliance controls.
- Discover Risky Access: Highlight individuals with inappropriate access rights.
What could have been a time-consuming requirement for the entire company is instead a non-event, giving IT high marks for easy-to-use automation.