RSA Identity Governance simplifies how organizations govern user access across the enterprise. RSA Identity Governance makes it possible to manage compliance consistently, on an ongoing basis, by fully automating the monitoring, reporting, certification and remediation of user entitlements.
Mike Duncan, IAM Program Manager for insurance provider Ameritas, explains how RSA Identity Governance and Lifecycle have reduced the time it takes to provision access for new users from five days to one day.
Automated Access Certifications
An automated, end-to-end solution helps information security teams deploy a repeatable, auditable and business-driven certification process.
An extensive set of built-in reports, combined with ad-hoc reporting capabilities, provides information security and compliance teams with visibility into the status of certification reviews across all users, information resources and entitlements.
Built-in workflows for access review, approval, exception handling and remediation are configurable, so you can easily adapt them to your organization’s processes.
Business and information security teams can easily define business rules that automate the monitoring of user entitlements and roles. This facilitates early identification, notification and remediation of inappropriate access, including segregation-of-duties violations.
Built-in metrics and risk sensitivity ratings can help information security, compliance, audit and risk management teams proactively manage access risk.
A closed-loop validation process ensures that entitlement revocations occur quickly and correctly; it also automatically escalates remediation activities if changes exceed a target timeframe.
RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification and remediation of user entitlements.