Avatier Identity and Access Risk Management Suite v9.0
October 01, 2012
Starts at $45 per user.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Rich set of functions (especially reporting) and ease of implementation.
- Weaknesses: The company does not provide a knowledge base or support forum/FAQ.
- Verdict: Good product, but needs to improve or better document their support.
Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs. Avatier has postured their product for the data leakage prevention (DLP) and identity management (IdM) security space. By coupling these two objectives together Avatier intends to help make the task of securing protected information easier for organizations already buried under a load of technology offerings that tend to add to the workload instead of reducing it. The product provides a number of rich modules or functions that provide the foundation for a sound identity management program. These include: Account Creator, Account Terminator, Compliance Auditor, Identity Analyzer, Password Bouncer, Password Station, and HR Feeds. These modules provide the initial dashboard within the product. Each of the modules has a drill-down set of sub-functions making this a very easy tool to navigate. The initialization begins with providing a list of authoritative sources to manage. Authentication options allow users to request reactivation of disabled accounts and more. There is even a clean branding page allowing an enterprise look and feel. The Connectors page provides easy-to-view up-down status with email alerting.
To avoid itemizing all of the features, suffice it to say that this is a well-thought-out product that really delivers. The system operates with almost zero lag time during almost all of the functions. The large number of prepared reports makes getting started so easy. The reports are easy to read with a lucid graphical layout.
Installation documentation is fairly easy to follow. The installation guide provides screen shots, examples and diagrams. Configuration settings for the various hardware and software preferences aid in keeping the installation process fairly straightforward.
Avatier Identity and Access Risk Management Suite is typically installed on Windows 2003 or 2008 (32- or 64-bit) using a virtual environment. Microsoft SQL Server is the predominantly used SQL DB, but Avatier also supports Oracle DB for the backend. There are a few prerequisites in addition to the above, including .NET 4.0 and an email relay. The actual install takes only minutes and can be done without the aid of extensive documentation. The software installer was literally a click, pause and users are up and running. The documentation is followed up with help messaging in the software and a link to support within the product.
Customer support levels include standard and AvatierCare. No details were provided regarding costs or service enhancements between the two support options. Support is provided by phone, email and via the company's website. No FAQ or knowledge base is available.
At a price starting at $45 per user, the product cost is comparable to similar products, but don't be fooled by the price, this is a remarkable offering. No speculation was possible for the lifecycle value of the product due to not having received support pricing levels.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Ransomware rampant, but chinks found in its armor
- Mining company's data is more valuable than gold
- PCI DSS version 3.2 release extends multifactor authentication requirement
- RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud
- U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech