RAC/M IdentityOKIOK Data
|
SecureIdentity IAMSecurEnvoy
|
|||||
Related Products
|
||||||
About
RAC/M Identity™ is a simple, effective, IGA solution that enables organizations large and small to understand and manage the complex relationships between users and their access to physical and digital assets, whether on-premises or in the cloud. It is the cornerstone upon which to build a successful IAM program capable of taming your most daunting challenges such as lack of resources, limited budgets, strict timelines, complex technological and business landscape. RAC/M Identity™ also addresses one of the most difficult challenges faced by IAM programs, maintaining executive support. It automatically generates a composite health score that reflects the maturity and effectiveness of key IAM processes, enabling executive management to assess progress made as well as the remaining road ahead on the journey. Risk is reduced by continuously identifying and remediating risky situations such as orphaned and rogue accounts, enforcing SOD rules as well as quickly revoking unnecessary access.
|
About
SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies of all sizes requiring a solution to manage the relationship between users and their access to physical and digital assets
|
Audience
Companies searching for an end to end identity and access management solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationOKIOK Data
Founded: 1973
Canada
www.okiok.com/products/identity-management-racm-identity/
|
Company InformationSecurEnvoy
Founded: 2003
United Kingdom
www.securenvoy.com/en-gb/identity-and-access-management-iam-platform
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
|
|||||
|
|
|||||
Categories |
Categories |
|||||
Integrations
A10 Thunder ADC
Active Directory
Amazon Web Services (AWS)
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
F5 BIG-IP
FortiGate NGFW
GlobalProtect
IBM Cloud
|
Integrations
A10 Thunder ADC
Active Directory
Amazon Web Services (AWS)
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
F5 BIG-IP
FortiGate NGFW
GlobalProtect
IBM Cloud
|
|||||
|
|