Access Governance

Access governance provides the ability to govern who has access to what within an organization there by reducing the risks associated with end users who have unnecessary access privileges.

Access Governance (AG) is a major enabler in Information Security. Many breaches occur due to accesses that should not exist. Employees’ accounts often retain accesses even after they leave the organization.  An AG system governs access rights in multiple ways. It enables the governance of all application accesses through a powerful analytics engine.

  • Consolidated Access View (‘Who has Access to What’)
  • Orphan Account status view
  • View of vital changes in access profiles, roles and other variables
  • Triggers upon exceptions

Download Brochure             Download Datasheet

Consolidated Access View

Get a real-time view of accesses across business apps.
Admins can see the accounts and entitlements that a user holds across apps. Action can be taken if anything is found out of place.

Orphan Account Management

Compact Identity detects orphan and dormant accounts across business apps and enables
admins to act.
Once detected, an orphan account can be:
1. Assigned to someone based on admin-defined criteria.
2. Assigned to a user manually by an admin
3. Suspended or deleted