Avatier Identity and Access Risk Management Suite v9.0
October 01, 2012
Starts at $45 per user.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Rich set of functions (especially reporting) and ease of implementation.
- Weaknesses: The company does not provide a knowledge base or support forum/FAQ.
- Verdict: Good product, but needs to improve or better document their support.
Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs. Avatier has postured their product for the data leakage prevention (DLP) and identity management (IdM) security space. By coupling these two objectives together Avatier intends to help make the task of securing protected information easier for organizations already buried under a load of technology offerings that tend to add to the workload instead of reducing it. The product provides a number of rich modules or functions that provide the foundation for a sound identity management program. These include: Account Creator, Account Terminator, Compliance Auditor, Identity Analyzer, Password Bouncer, Password Station, and HR Feeds. These modules provide the initial dashboard within the product. Each of the modules has a drill-down set of sub-functions making this a very easy tool to navigate. The initialization begins with providing a list of authoritative sources to manage. Authentication options allow users to request reactivation of disabled accounts and more. There is even a clean branding page allowing an enterprise look and feel. The Connectors page provides easy-to-view up-down status with email alerting.
To avoid itemizing all of the features, suffice it to say that this is a well-thought-out product that really delivers. The system operates with almost zero lag time during almost all of the functions. The large number of prepared reports makes getting started so easy. The reports are easy to read with a lucid graphical layout.
Installation documentation is fairly easy to follow. The installation guide provides screen shots, examples and diagrams. Configuration settings for the various hardware and software preferences aid in keeping the installation process fairly straightforward.
Avatier Identity and Access Risk Management Suite is typically installed on Windows 2003 or 2008 (32- or 64-bit) using a virtual environment. Microsoft SQL Server is the predominantly used SQL DB, but Avatier also supports Oracle DB for the backend. There are a few prerequisites in addition to the above, including .NET 4.0 and an email relay. The actual install takes only minutes and can be done without the aid of extensive documentation. The software installer was literally a click, pause and users are up and running. The documentation is followed up with help messaging in the software and a link to support within the product.
Customer support levels include standard and AvatierCare. No details were provided regarding costs or service enhancements between the two support options. Support is provided by phone, email and via the company's website. No FAQ or knowledge base is available.
At a price starting at $45 per user, the product cost is comparable to similar products, but don't be fooled by the price, this is a remarkable offering. No speculation was possible for the lifecycle value of the product due to not having received support pricing levels.
Sign up to our newsletters
SC Magazine Articles
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- New attack uses ransomware to drop trojans and keyloggers
- 'GHOST' bug in Linux library enables remote takeover of victim's system
- Firm finds link between Regin spy tool and QWERTY keylogger
- Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed
- Researchers observe databases being encrypted, websites held for ransom
- ZeroAccess botnet reactivates, click fraud activity resumes
- BCBS of Tennessee shares personal data on 80K in marketing campaign
- Tips for organizations in the wake of the biggest corporate hack in history