Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.

Description

Control access to all your business applications and services from a centralized platform. Utilize an intuitive drag-and-drop interface to design workflows, forms, and processes that are accessible to non-technical users. A user-friendly experience fosters higher adoption rates and promotes training among users. You can filter and schedule compliance certifications based on users, groups, or applications. Support staff is available around the clock to assist with any inquiries. Regular updates to documentation and video tutorials ensure that users stay informed. The no-code design empowers team leaders to manage their own applications and user access. You can establish both static and dynamic attribute-based roles to streamline entitlements and access. Pricing is straightforward and based on individual users, with all features included—no hidden costs for additional functionalities. This system effectively removes the need for passwords, reducing the risk of phishing attacks and minimizing IT service requests related to password resets. Each resource, including service requests, applications, entitlements, or roles, adheres to a designated approval workflow, ensuring that all access requests are properly vetted. By implementing this streamlined approach, organizations can enhance security and operational efficiency significantly.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Salesforce
AWS Identity and Access Management (IAM)
Active Directory
Amazon Web Services (AWS)
Dayforce
Docker
Fiserv
GitHub
Google Cloud Platform
IBSRE Property Management Accounting
Kubernetes
LDAP
Microsoft 365
Microsoft Entra ID
Okta
Workday HCM
Zoom

Integrations

Salesforce
AWS Identity and Access Management (IAM)
Active Directory
Amazon Web Services (AWS)
Dayforce
Docker
Fiserv
GitHub
Google Cloud Platform
IBSRE Property Management Accounting
Kubernetes
LDAP
Microsoft 365
Microsoft Entra ID
Okta
Workday HCM
Zoom

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$70/user/year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Security Compliance Corp

Founded

2006

Country

United States

Website

www.securitycompliancecorp.com

Vendor Details

Company Name

Sath

Country

United States

Website

sath.com/idhub/

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Alternatives

Passly Reviews

Passly

IDAgent
Bravura Identity Reviews

Bravura Identity

Bravura Security
cidaas Reviews

cidaas

WidasConcepts
iGRIFFIN Reviews

iGRIFFIN

Secuve
NIM Reviews

NIM

Tools4ever