
DirXEviden
Evidian DirX provides a robust suite of Identity and Access Management solutions, enabling organizations to manage identities, access rights, and compliance efficiently across various deployment models.
Vendor
Eviden
Company Website
Product details
Evidian DirX provides a robust suite of Identity and Access Management solutions, enabling organizations to manage identities, access rights, and compliance efficiently across various deployment models.
Key Features
- DirX Identity: Offers process-driven identity management with lifecycle management, automated provisioning, and risk-based governance.
- Lifecycle management for users and roles
- Cross-platform and rule-based provisioning
- Web-based self-service functions
- Delegated administration and access certification
- DirX Access: Provides policy- and risk-based authentication and authorization for web applications.
- Single sign-on and versatile authentication methods
- Identity federation using SAML, OAuth, and OpenID Connect
- Just-in-time provisioning and entitlement management
- DirX Audit: Offers analytical insights for compliance and security audits.
- Historical views and reports on identity data
- Graphical dashboard for event monitoring
- Job management for report generation
- DirX Directory: A standards-compliant LDAP and X.500 directory server for identity storage and management.
- High-performance and highly available
- Scalable to manage large user bases
- Supports SSL/TLS encryption and strong authentication
Benefits
- Enhanced Security: Provides robust security features to protect identities and access rights.
- Strong authentication and authorization mechanisms
- Compliance with regulatory standards
- Efficiency and Scalability: Offers scalable solutions that can adapt to growing organizational needs.
- High availability and reliability
- Support for large-scale directory management
- Compliance and Auditing: Facilitates sustainable compliance through detailed auditing and reporting.
- Analytical insights for identity and access management processes
- Historical data analysis for security audits