Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Access Assurance Suite, part of the Core Security Identity Governance and Administration solutions formerly recognized as Courion, is a sophisticated identity and access management (IAM) software system that empowers organizations to facilitate informed provisioning, ensure continuous regulatory compliance, and utilize actionable analytics for enhanced identity governance. This suite consists of four leading-edge modules, providing an intelligent and efficient strategy for reducing identity-related risks while offering a comprehensive solution for optimizing the provisioning workflow, assessing access requests, managing compliance, and enforcing stringent password policies. Additionally, it features a user-friendly web portal where end users can easily request access, and managers have the ability to review and either approve or deny those requests. Adopting a shopping cart model, Core Access enhances the overall experience by streamlining processes and eliminating the need for cumbersome paper forms, emails, and tickets traditionally used for access management. This modern approach not only improves efficiency but also fosters better communication between users and administrators.
Description
SecureIdentity IAM effectively manages access control decisions related to applications and data repositories. By leveraging insights from the Universal Directory, it can dynamically determine which applications a user may access and the specific file servers or cloud storage they are permitted to use. This access control is enforced through a client present on the endpoints, which intercepts access requests for applications or data and evaluates them against established policies. If the requested action is permitted, the user experiences seamless access without any interruptions. Conversely, if access is denied, the system blocks the appropriate executable or DLL files from being executed, regardless of the method used to invoke them. Additionally, all actions are meticulously logged and sent to the platform's event database, creating a detailed forensic trail of user activity, which is essential for security audits and compliance. This comprehensive approach ensures both user convenience and stringent security measures are maintained throughout the access process.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Web Services (AWS)
Microsoft Azure
A10 Thunder ADC
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
GlobalProtect
IBM Cloud
Ivanti Connect Secure
Integrations
Active Directory
Amazon Web Services (AWS)
Microsoft Azure
A10 Thunder ADC
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
GlobalProtect
IBM Cloud
Ivanti Connect Secure
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Core Security (Fortra)
Founded
1996
Country
United States
Website
www.coresecurity.com/products/access-assurance-suite
Vendor Details
Company Name
SecurEnvoy
Founded
2003
Country
United Kingdom
Website
www.securenvoy.com/en-gb/identity-and-access-management-iam-platform
Product Features
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Self-Service Password Reset (SSPR)
Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
Product Features
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning