Avatier Identity and Access Risk Management Suite v9.0
October 01, 2012
Starts at $45 per user.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Rich set of functions (especially reporting) and ease of implementation.
- Weaknesses: The company does not provide a knowledge base or support forum/FAQ.
- Verdict: Good product, but needs to improve or better document their support.
Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs. Avatier has postured their product for the data leakage prevention (DLP) and identity management (IdM) security space. By coupling these two objectives together Avatier intends to help make the task of securing protected information easier for organizations already buried under a load of technology offerings that tend to add to the workload instead of reducing it. The product provides a number of rich modules or functions that provide the foundation for a sound identity management program. These include: Account Creator, Account Terminator, Compliance Auditor, Identity Analyzer, Password Bouncer, Password Station, and HR Feeds. These modules provide the initial dashboard within the product. Each of the modules has a drill-down set of sub-functions making this a very easy tool to navigate. The initialization begins with providing a list of authoritative sources to manage. Authentication options allow users to request reactivation of disabled accounts and more. There is even a clean branding page allowing an enterprise look and feel. The Connectors page provides easy-to-view up-down status with email alerting.
To avoid itemizing all of the features, suffice it to say that this is a well-thought-out product that really delivers. The system operates with almost zero lag time during almost all of the functions. The large number of prepared reports makes getting started so easy. The reports are easy to read with a lucid graphical layout.
Installation documentation is fairly easy to follow. The installation guide provides screen shots, examples and diagrams. Configuration settings for the various hardware and software preferences aid in keeping the installation process fairly straightforward.
Avatier Identity and Access Risk Management Suite is typically installed on Windows 2003 or 2008 (32- or 64-bit) using a virtual environment. Microsoft SQL Server is the predominantly used SQL DB, but Avatier also supports Oracle DB for the backend. There are a few prerequisites in addition to the above, including .NET 4.0 and an email relay. The actual install takes only minutes and can be done without the aid of extensive documentation. The software installer was literally a click, pause and users are up and running. The documentation is followed up with help messaging in the software and a link to support within the product.
Customer support levels include standard and AvatierCare. No details were provided regarding costs or service enhancements between the two support options. Support is provided by phone, email and via the company's website. No FAQ or knowledge base is available.
At a price starting at $45 per user, the product cost is comparable to similar products, but don't be fooled by the price, this is a remarkable offering. No speculation was possible for the lifecycle value of the product due to not having received support pricing levels.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- RAUM weaponizes torrents to deliver malware
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void
- SWIFT adds additional protective measures for members to ensure cybersecurity compliance
- 185M incidents bypassed perimeter defenses - report
- Pagers found leaking patient health information
- OVH suffers massive 1.1Tbps DDoS attack