NetIQ Identity Tracking

Features

Detailed views of user activity

NetIQ Identity Tracking maps multiple system entitlements back to a specific user. This information is displayed in an intuitive user interface that gives business managers a complete view of a user's privileges and helps them make informed decisions about provisioning and access requests.

Clear, concise monitoring

With NetIQ Identity Tracking, you can automatically monitor activity in key systems in real time and take necessary action when suspicious or non-compliant activity occurs. You can also correlate potential threats and violations with actual users, identifying how users got their access to key systems.

Real-time monitoring and remediation

Identity Tracking monitors user activity in key systems so that you can take immediate action if out-of-policy events occur. By combining user provisioning with security monitoring, Identity Tracking delivers business process automation that gives you the appropriate resources, validated in real time, to ensure compliance with company policies.

Advanced reporting

Identity Tracking allows you to see who has access to what key systems, and what they are doing with that access, all in real-time. This comprehensive reporting capability allows you an unparalleled, in-depth view into your enterprise.

Create custom security reports

In addition to standard reports, Identity Tracking also delivers the flexibility to create custom security reports. These custom reports allow administrators to specify criteria such as which users to include, what time frame to report on, and what kind of activities to cull.

Identity and security integration

Identity Tracking ties your identity management information to security events, giving you comprehensive compliance and unbeaten security across key systems.

release-rel-2019-3-2-1847 | Wed Mar 20 13:57:48 PDT 2019
1847
release/rel-2019-3-2-1847
Wed Mar 20 13:57:48 PDT 2019