Logo
/
Sign in
Product Logo
DirXEviden

Evidian DirX provides a robust suite of Identity and Access Management solutions, enabling organizations to manage identities, access rights, and compliance efficiently across various deployment models.

Vendor

Vendor

Eviden

Product details

Evidian DirX provides a robust suite of Identity and Access Management solutions, enabling organizations to manage identities, access rights, and compliance efficiently across various deployment models.

Key Features

  • DirX Identity: Offers process-driven identity management with lifecycle management, automated provisioning, and risk-based governance.
    • Lifecycle management for users and roles
    • Cross-platform and rule-based provisioning
    • Web-based self-service functions
    • Delegated administration and access certification
  • DirX Access: Provides policy- and risk-based authentication and authorization for web applications.
    • Single sign-on and versatile authentication methods
    • Identity federation using SAML, OAuth, and OpenID Connect
    • Just-in-time provisioning and entitlement management
  • DirX Audit: Offers analytical insights for compliance and security audits.
    • Historical views and reports on identity data
    • Graphical dashboard for event monitoring
    • Job management for report generation
  • DirX Directory: A standards-compliant LDAP and X.500 directory server for identity storage and management.
    • High-performance and highly available
    • Scalable to manage large user bases
    • Supports SSL/TLS encryption and strong authentication

Benefits

  • Enhanced Security: Provides robust security features to protect identities and access rights.
    • Strong authentication and authorization mechanisms
    • Compliance with regulatory standards
  • Efficiency and Scalability: Offers scalable solutions that can adapt to growing organizational needs.
    • High availability and reliability
    • Support for large-scale directory management
  • Compliance and Auditing: Facilitates sustainable compliance through detailed auditing and reporting.
    • Analytical insights for identity and access management processes
    • Historical data analysis for security audits