IBM Verify GovernanceIBM
Provision, audit and report on user access and activity through lifecycle, compliance and analytics capabilities, on-prem and for the cloud.
Vendor
IBM
Company Website



Product details
Take a new approach to risk modeling
Provision, audit and report on user access and activity through lifecycle, compliance and analytics capabilities, using a more efficient approach to risk modeling. Instead of managing separation-of-duties (SoD) violations with role-based identity governance policies, IBM Verify Governance uses business activities, such as creating a purchase order. Because these are more static than roles, they can be associated to specific tasks and, importantly, speak the language of auditors and compliance managers.
Features
- **Increased end-user satisfaction: **Streamline full provisioning and self-service requests to quickly onboard, offboard or manage employees. Enhanced password synchronization supports single sign-on.
- **Improved regulatory compliance: **Eliminate manual efforts on IT audits with closed-loop compliance, data governance capabilities and GDPR-specific controls.
- **Reduced business risk: **Make appropriate access decisions and enable risk and compliance managers to quickly identify violations with SoD controls, including for SAP.
- **Insight into risky users: **Identity analytics provide visual insights into risky users and insider threats to help you detect behavior anomalies and suspend accounts in Verify Governance.
- **Reduced operational costs: **Automate labor-intensive processes and the identity lifecycle process to dramatically lower operational costs.
- **Access certification: **Run access certification campaigns with a customizable, self-service dashboard.
- **Role analysis: **Easily review and manage users, roles, entitlements and assignments.
- **Access request workflow: **Automate identity lifecycle and entitlement discovery and access provisioning.