NetIQ Access Governance Suite is an identity governance solution that provides a consistent, business-friendly interface built on a common governance model that spans all of your business processes relating to identity, access and certification. It gives you the tools to get compliant, and stay compliant.
The Governance Platform centralizes identity data, roles, business policy and risk modeling to support both compliance initiatives and user lifecycle management.
Identity Intelligence transforms technical identity data scattered across multiple enterprise systems into centralized, easily understood and business-relevant information including dashboards, reports and advanced analytics.
Support enterprise-wide identity management with a centralized framework
The Governance Platform lays the foundation for effective identity management within your enterprise. It does this by establishing a framework that centralizes identity data from multiple sources and captures business policy, models roles, and proactively manages user and resource risk factors.
Highlights key identity risk factors for users across the enterprise. This helps you to focus and prioritize compliance efforts.
Elevates identity risk scores for users who have not had timely certification reviews.
Get compliant, stay compliant
To be compliant you need to know who has access to what, determine if that access is appropriate for the role, and prove you have access under control. Compliance Manager streamlines compliance controls and improves audit performance through automated access certifications and policy enforcement.
Business-oriented certification process
Enables your organization to distribute certification decisions to business users by simplifying the presentation of complex IT access data.
Ensures continuous compliance by sending automatic revocation requests to an automated or manual user provisioning system, and validating that changes occurred.
Empower the business to manage user access
Change and complexity require IT to partner with the business to take an active role in managing the day-to-day activities associated with certifying and requesting access. Lifecycle Manager provides self-service access request and lifecycle event management to simplify and automate the creation, modification and revocation of user access privileges.
Automated certification workflow
Automates certification routing, notification, and escalations; the deletion or reassignment of certifications; and the ability to define challenge and remediation points.
Automated role creation
Automates role design via top-down role modeling and IT role mining.
Role lifecycle management
Manages the definition, maintenance, and retirement process for roles with automated workflows and change control.
Transform technical data into business-relevant information with Identity Intelligence
Identity Intelligence creates a 360° view of each user's identity, establishing critical links between a user's identity, access privileges and related job duties.
Data aggregation and correlation
Creates a single repository of user and access information by extracting data from authoritative sources, resolving data inconsistencies, and creating a single enterprise-wide view into identity data across all relevant systems.
Consolidated access certification reporting
Centralizes access data, including entitlements, roles, and policy violations, across the organization and formats it into easy-to-read certification reports.