Access Auditor Suite

Automate User Access Reviews in One Week

Access Auditor is the fastest and easiest way to automate the entire user access review process. Access Auditor automates the discovery, review, reporting, and alerting of user access rights with an easy-to-use web-based application. Forget the spreadsheets, and let Access Auditor simplify your user entitlement reviews (UAR).

Why Access Auditor for User Access Reviews

Access Auditor is the fastest and most powerful tool for automating your user access reviews. For over 18 years, SCC has been delivering access review automation with the unique combination of the features and ease of use you need to success.

Build your identity warehouse from all both cloud and on-premise applications.

SCC invented the Fuzzy ID to identify users so you don’t need a single source of record.

One-click user access reviews fully-customized to deliver user access reviews YOUR way

All evidence of identity access review compliance saved in one place forever.

Powerful governance features like alerting on changes, separation of duties, and discovering terminated users.

Role-Mining capability to enable role-based access reviews and provisioning.

User Access Reviews

Automate User Access Reviews

Stop the spreadsheet rodeo and succeed with our easy-to use access review solution.

  • Access Certification: Automate user access reviews with an easy-to-use web-based solution.
  • Workflow Engine: Flexible rules-based workflows allow for managers, business owners, and others to approve or deny the rights assigned to their users, and initiate remediation as necessary.
  • Compliance Reporting: Records of all reviews are saved for instant audit and compliance reporting.
  • Identity Warehouse: Single pane of glass view into who has access to what.
Fuzzy ID

Fuzzy ID

The Fuzzy ID discovers and links users from disparate systems with no common login ID or unique identifier.

  • Discover Users: Link users from disparate applications even when no consistent login ID exists.
  • AI Algorithm: Proprietary name-matching algorithms automatically identify the same user in multiple systems even with no common attribute.
  • Save Time and Effort: Eliminates the need to modify applications to insert a unique identifier.
  • Single View of Truth: Establishes a single repository of all access data across the entire enterprise.
Manage Cloud Access Rights

Manage Cloud Access Rights

Access Auditor combines access rights for both in-house and cloud applications within a single product.

  • Single Identity Warehouse: Provide one identity data warehouse for all users and all applications regardless of location.
  • Automation Everywhere: Automate user access for all cloud and on-premise applications.
  • Fast Setup: One-click setup to start user access reviews on all web applications.
  • Changes in the Cloud: Monitor for changes and cross-application separation of duties.
Role Manager

Role-Based Compliance and Reporting

Perform role-based entitlement reviews that highlight privileges users have outside of their pre-approved roles.

  • Role Mining: Define roles and role memberships with Role Mining.
  • Role-Based Reviews: Perform certifications by roles and exceptions to improve accuracy and relevance.
  • Model Changes: Perform what-if scenarios to define cross-application enterprise roles.
  • Improve Access Review Accuracy: Improve relevance of certifications by reviewing a handful of roles instead of hundreds of privileges.
  • Manage Role-Based Access: Define and manage roles by comparing role memberships and exceptions.
Alert on Changes

Alert on Changes to Risky Privileges

Access Auditor monitors and alerts on changes in sensitive roles or privileges.

  • Change Monitoring: Every data element is monitored for changes on a scheduled basis.
  • Simple Setup: Simple interface for configuring custom alerts and actions.
  • Unlimited Alerts: Generates alerts if user or access data has changed since the last audit scan.
  • Detects Unauthorized Changes: Detects unauthorized changes to systems.
Separation of Duties

Enforce Separation of Duties

Define and manage cross-application separation of duties (SOD) rules, and receive alerts and reports on violations.

  • Cross-Application: Create cross-application privilege conflict rules.
  • Prevent Fraud: Prevent fraud by limiting excessive privileges.
  • Report on Violations: Report on violations to policies and enforce key SOD compliance controls.
  • Discover Risky Access: Highlight individuals with inappropriate access rights.

What could have been a time-consuming requirement for the entire company is instead a non-event, giving IT high marks for easy-to-use automation.

Don Smith, CIO, Responsys