Contact Sales

Request Trial

Request Demo

Benefits

  • Simplify Access Governance: Fully automate the monitoring, reporting, certification and remediation of user entitlements to simplify access delivery and meet ongoing compliance demands

  • Speed Deployment at Lower Cost: A configuration-over-customization approach helps reduce the time and cost it takes to get your identity governance solution up and running. The solution lowers ongoing maintenance costs, ultimately reducing overall time to value.

  • Leverage Identity as an Enterprise Risk Control Factor: Provide risk and compliance teams with actionable data to identify the potential risks your employees, partners, customers and contractors pose. These insights can yield powerful compliance controls that reduce the risk of a breach or noncompliance.

  • Gain Control and Visibility: Improve your ability to safeguard data by quickly identifying orphaned accounts, inappropriate user access and policy violations with a unified view of access across all of your systems and applications.

  • Streamline Fulfillment of Access Requests: Ensure your users gain access to the resources they need, when they need them, in accordance with compliance requirements.

  • Achieve a Sustainable Identity and Access Management Program: Enable users to quickly and easily connect to applications and empower administrators to easily manage policies, certification campaigns and system maintenance without costly customized coding.

Features

  • ACCESS CERTIFICATION

    Enable user-friendly access certifications by providing the business context and risk-based prioritization to business owners to complete more accurate and timely access reviews.

  • POLICY AUTOMATION

    Automate access reviews and certifications to ensure all access is assessed against existing business polices and controls.

  • ADVANCED REPORTING

    Ad-hoc and built-in reports and dashboards provide a centralized summary analysis of access across all users, data resources, entitlements and certifications.

  • USER PROVISIONING

    Streamline and automate all phases of the user provisioning process, from request and fulfillment to de-provisioning as users join, move within or leave your organization.

  • SELF-SERVICE ACCESS REQUESTS

    An intuitive interface makes it easy for users to submit their own access requests and track approvals.

  • ROLE MANAGEMENT

    Easily discover, create and model different roles based on “birthright” entitlements or other factors.

Bring Identity Risk into Focus

Everywhere you look, boundaries are blurring. RSA Identity Governance and Lifecycle protects your business from the identity and access risks that arise in today’s boundary-less world. It gives your dynamic users the access they need when they need it. With RSA, you can pinpoint and mitigate your greatest risks before they disrupt your business.

KuppingerCole Executive View on RSA Identity Governance and Lifecycle

Read the latest report from John Tolbert, analyst for KuppingerCole, and learn how RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. It covers all aspects of identity governance, including attestations and policy exceptions, and all stages of the identity lifecycle, including provisioning, assigning entitlements, and reconciling and removing access.

Identity Governance

RSA® Identity Governance helps organizations manage compliance on a consistent basis by fully automating the monitoring, reporting, certification and remediation of user entitlements.

Identity Lifecycle Management

RSA® Identity Lifecycle helps to ensure the right people have the right access at the right time. The solution streamlines the access request and provisioning process for business users with an intuitive, self-service interface and an innovative approach to provisioning user access across all target systems.

Data Access Governance

RSA® Data Access Governance provides IT organizations with the ability to monitor, report on and certify the legitimacy of user access permissions to unstructured data resources stored on Microsoft Windows, Linux and UNIX file servers; network-attached storage devices; and Microsoft SharePoint servers.

Role Management

RSA® Business Role Manager delivers top-down and bottom-up role discovery, creation, modeling and suggestions. It helps streamline access based on “birthright” entitlements associated with specific functional roles so that, for example, HR managers receive access to HR systems. It also enables a metrics-driven approach to role modeling based on pattern analysis and policy validation.

Federal Identity Governance

Federal agencies face greater scrutiny managing identities and access—especially as the government modernizes with cloud and mobile technologies. RSA Identity Governance and Lifecycle is Common Criteria Certified (Protection Profile for Enterprise Security Management – Identity and Credential Management Version 2.1) and ready to support agencies managing growing identity and access governance.