What is Access Auditor?

Access Auditor streamlines the process of reviewing user access and entitlements by automating these tasks, while also providing alerts for any modifications to user access permissions and keeping track of separation of duties violations. The tool offers visibility into who possesses access rights, and it can integrate with any AD/LDAP, database, or REST API for user imports. Additionally, it allows for the modeling and definition of enterprise roles (RBACs), enabling comprehensive RBAC reviews and provisioning capabilities.

Similarly, Access Manager facilitates the automation of user access rights provisioning and management, utilizing the same user-friendly interface, and is applicable to any systems incorporating a database, REST API, or LDAP.

SCC's straightforward and effective method for Identity Management ensures quick success at an affordable price point, with Access Auditor achieving a remarkable customer success rate of 100%, capable of automating user access reviews in under a week. This efficiency makes it an invaluable tool for organizations seeking to enhance their access management processes.

Pricing

Price Overview:
Pricing per user, no connector fees

Integrations

Offers API?:
Yes, Access Auditor provides an API

Screenshots and Video

Access Auditor Screenshot 1

Company Facts

Company Name:
Security Compliance Corp
Date Founded:
2006
Company Location:
United States
Company Website:
www.securitycompliancecorp.com
Edit This Page

Product Details

Deployment
SaaS
Windows
On-Prem
Training Options
Documentation Hub
Online Training
Webinars
On-Site Training
Video Library
Support
Standard Support

Product Details

Target Company Sizes
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Access Auditor Categories and Features

User Provisioning and Governance Software

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Identity Management Software

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning