Avatier Identity and Access Risk Management Suite v9.0
October 01, 2012
Starts at $45 per user.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Rich set of functions (especially reporting) and ease of implementation.
- Weaknesses: The company does not provide a knowledge base or support forum/FAQ.
- Verdict: Good product, but needs to improve or better document their support.
Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs. Avatier has postured their product for the data leakage prevention (DLP) and identity management (IdM) security space. By coupling these two objectives together Avatier intends to help make the task of securing protected information easier for organizations already buried under a load of technology offerings that tend to add to the workload instead of reducing it. The product provides a number of rich modules or functions that provide the foundation for a sound identity management program. These include: Account Creator, Account Terminator, Compliance Auditor, Identity Analyzer, Password Bouncer, Password Station, and HR Feeds. These modules provide the initial dashboard within the product. Each of the modules has a drill-down set of sub-functions making this a very easy tool to navigate. The initialization begins with providing a list of authoritative sources to manage. Authentication options allow users to request reactivation of disabled accounts and more. There is even a clean branding page allowing an enterprise look and feel. The Connectors page provides easy-to-view up-down status with email alerting.
To avoid itemizing all of the features, suffice it to say that this is a well-thought-out product that really delivers. The system operates with almost zero lag time during almost all of the functions. The large number of prepared reports makes getting started so easy. The reports are easy to read with a lucid graphical layout.
Installation documentation is fairly easy to follow. The installation guide provides screen shots, examples and diagrams. Configuration settings for the various hardware and software preferences aid in keeping the installation process fairly straightforward.
Avatier Identity and Access Risk Management Suite is typically installed on Windows 2003 or 2008 (32- or 64-bit) using a virtual environment. Microsoft SQL Server is the predominantly used SQL DB, but Avatier also supports Oracle DB for the backend. There are a few prerequisites in addition to the above, including .NET 4.0 and an email relay. The actual install takes only minutes and can be done without the aid of extensive documentation. The software installer was literally a click, pause and users are up and running. The documentation is followed up with help messaging in the software and a link to support within the product.
Customer support levels include standard and AvatierCare. No details were provided regarding costs or service enhancements between the two support options. Support is provided by phone, email and via the company's website. No FAQ or knowledge base is available.
At a price starting at $45 per user, the product cost is comparable to similar products, but don't be fooled by the price, this is a remarkable offering. No speculation was possible for the lifecycle value of the product due to not having received support pricing levels.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards