COMPACT IDENTITY

THE ULTIMATE IDENTITY AND ACCESS MANAGEMENT SOLUTION

Why Compact Identity?

For the first time there is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons. This includes Access Management as well as Identity Governance and Administration.

A unique online digital guidance system helps you implement the solution step-by-step and at your own pace. Unlike other vendors, Ilantus also offers implementation support as per your needs at no extra charge.

Single Sign On

SSO to any App

Seamless SSO with ‘no app left behind’, including on-premise and thick-client apps. Web apps, federated, non-federated, thick-client, legacy or custom apps – will all be included in your SSO environment. Mobile apps and IOT devices are supported too. Homegrown app? Our interactive digital help guide ensures that this will not be an issue. And, if you need assistance with it, call Ilantus’ dedicated helpline available 24 hours from Monday to Friday and we will do the integration for you.

App Store

Database of commonly used apps, pre-configured, and ready to download. Custom or homegrown apps can be integrated easily.

Browser Preference

Experience superior optimization when each app launches in its preferred browser – a simple configuration that only takes a few clicks.

Shared App Login

Save money by sharing app licenses. Compact Identity can allow multiple employees to use a single license during different sessions, and yet protect the app password from all the users. Accountability for all users of a license through audits is also supported.

Compact Identity

Universal Directory

Compact Identity comes with a Universal Directory at no extra cost. AD licensing is expensive. If your business doesn’t feel the need for an AD at all or only wants to create AD accounts where they are required, the Universal Directory is the cost effective way to create identities in your IT environment.

Authentication

Authentication verifies that a user is who they say they are when – accessing a target application/system, recovering a forgotten password and unlocking an account.

This is possible with step up or multiple authentication mechanism factors (MFA) such as:

  • What the user knows – Password, Challenge Response
  • What the user has – Email / SMS OTP, Soft Tokens
  • What the user is – Biometric

Risk-Based Authentication

Compact Identity uses real time intelligence to calculate a user’s risk score based on factors such as device, location, and network connection. The system then associates a risk rating based on the context and decides to:

  • Allow the user access or
  • Prompt another level of authentication or
  • Simply deny the access if the risk score is high

Password Management

Compact Identity possesses the most comprehensive password management system anywhere in the industry. Not only does it provide capabilities to reset forgotten passwords, it also synchronizes passwords from apps that are not connected to your AD.

Password Synchronization

Eliminate wasted time and avoid confusion when passwords that are changed or reset within Compact Identity, or within apps, are synced with one other.

  • Forward Password Sync: Password changes in Compact Identity are synced with your AD
  • Reverse Password Sync: AD password changes are synced with Compact Identity

Password Rest – Helpdesk Assisted

Empower your Helpdesk to perform password resets from their end, utilizing the Compact Identity interface.

help-desk

Password Rest – User Initiated

We all forget passwords and even when we don’t, we must change them from time-to-time for security reasons. Our solution allows you to reset forgotten passwords at anytime or change passwords on a schedule.

Identity Governance

Today, perhaps the most important part of an IAM solution, is Identity Governance. This technology allows you to govern your identities and accesses for complete compliance and audit control. Unfortunately, access management solutions in the market offer only shallow identity governance capabilities. Compact Identity, however, offers this at the deepest possible level. It even utilizes advanced analytics and business intelligence to power up your dashboards and display the most critical identity and access parameters on the fly.

Access Request:

Compact Identity enables your employees to request accesses to roles, apps and entitlements by themselves. Users can see the risk score of an entitlement they are requesting, whether their peers have such accesses, their chances of getting it approved and the average turnaround time for access to be granted. This intelligent decision-making guidance increases the efficiency of what would normally be a simple but frustrating mechanical process.

Self-service Access Request

To roles, apps, entitlements (supported with analytics and system suggestions) and request for any attribute to reduce risks

Request Access
Multi-level approvals

Get set with multiple levels to approve a high-risk access

Manager approval

Supported by analytics and risk metrics, enable managers to take right decisions by providing required information on the fly.

Delegated approval

Allow managers to delegate if not confident in taking decision

Access review

Access Certification

A safe business not only utilizes a secure access provisioning system but reviews access rights regularly. Our solution automates user access reviews and, if configured, revokes accesses that are no longer suitable, or, pushes notifications to various target systems for managers to review. Compact Identity pushes the details of access reviews that are scheduled to be performed to managers, owners, or security specialists in non-technical language that is easy to understand.

Access Review/Certification

Regularly monitor ‘who has access to what’

Compact Identity
Multi-level review

Reassess the appropriateness of accesses at specified intervals

Auto Fulfilment

Ensures that all access that are no longer required are terminated

Orphan Account Identification and Management

Sometimes accounts can become ‘orphaned’ when they no longer have a valid user. Such accounts present a critical security risk because they can be used and accessed without any person being accountable for actions performed within these accounts. Compact Identity detects orphan accounts and enables admins to delete them. This automation also saves your business money by freeing up licenses.

Compliance Reports

Choose from a host of pre-configured reports. Or, customize reports for exclusive needs. View these reports on your dashboard with trends and other analyses.

Identity Administration

Managing the identity and access lifecycles of users manually is not only a cumbersome, low-productivity process, but also a security risk because the accesses of employees often remain enabled in most businesses, even after they are terminated. Modifying accesses for employees during promotions or transfers is also troublesome. Compact Identity is the most comprehensive answer to these challenges.

Self Service Access Request

Employees often need to access new roles, apps or entitlements as they grow in their jobs, and their projects become more complex. Compact Identity lets them request this on the go

Multi-Level Request Approvals

A single person approving an app, role or entitlement request works for most low-risk apps. But, what happens when access to an app also exposes a user to sensitive data or enables them to make high-impact decisions? In such situations, approval from multiple concerned parties is best. Compact identity allows you to configure multi-level workflows for an app to be approved.

Manager Approval

Managers can handle access requests intelligently with support from analytics and risk metrics that are inherent in Compact Identity.

Birthright Provisioning

Save time and money and avoid confusion when our solution automatically creates user accounts with entitlements for new employees in target applications.

Promotions and Transfers

Promotions and transfers maximize a business’ employee investments. But, this comes with overhead. Our solution automatically manages access rights when an employee changes Roles/jobs within your company and thereby increases agility.

Deprovisioning

Protect your business and comply with statutory regulations when our solution automatically disables access to roles, apps, and entitlements as an employee quits or is terminated.

Analytics and Business Intelligence

Gain a multidimensional view of identity data in your company with Compact Identity’s advanced data mining and analytics.

  • Advanced Data Mining and Analytics
    • Provides business context to information
    • Multidimensional views of identity data
    • Provides comprehensive user administration and governance information
  • Customizable Dashboards

Customizable Dashboard

 In Compact Identity, for the first time in the history of IAM, ILANTUS has introduced dashboards which can be customized to any role. Security, compliance, IT admins, finance departments, managers, or employees all have requirements when it comes to what identity and access related information they need to view. Compact Identity has dashboards that are visually and logically customized to every role.

Consolidated Access View

In today’s IT security environment, knowledge is power, and organized knowledge is ideal. Our dashboard’s consolidated view shows individual and aggregate identity, and related access, information and statistics in the most concise and accessible way. The dashboard can be customized to different ‘user personas’ such as IT Admins, App Owners, IT Security, etc

Others

Enterprise Mobility Management

With corporate staff using mobile devices for work on-the-go these days, it is critical that the company data is secure. Compact Identity monitors and controls data on corporate devices, locks apps and data on lost devices, and erases corporate information when employees quit or are terminated.

  • SSO to mobile applications including OAuth & Open ID
  • Auto install/uninstall apps when access rights are granted or revoked
  • Control corporate data on registered devices
  • Lock apps and data when devices are lost
  • Erase corporate information as soon as employees depart
Compact Identity

3rd Party Integrations

  • OOTB integration to Microsoft Azure Access Management- add to your Microsoft access management all IGA features
  • Integration with 3rd Party AM, IGA and PAM solutions
  • Integration to leading endpoint management technologies to optimize security
  • Integration with security tools such as SIEM, UEBA

API Management

  • Utilize Compact Identity functions like authentication for your own services
  • Manage all APIs securely and easily.
  • Source of authentication to 3rd party applications
  • OAuth ready – applications like Azure AD can SSO to Compact Identity
  •   API’s supported
    • Add User
    • Edit User
    • Suspend User
    • Restore User
    • Delete User

IoT Management

With the proliferation of IOT devices in the workplace, it is becoming imperative that access rights involving these devices are properly governed. Compact Identity enables your business to do this easily. Another IOT business challenge is that many IOT devices lack proper authentication and Compact Identity solves this issue too.

  • Manage login to IoT devices
  • Create, suspend, delete IoT user access
  • Supports all protocols: HTTP, XMPP, Web Socket, MQTT

Endpoint Management

It is not sufficient just to manage accesses to applications by simply granting or revoking them at appropriate times. These days, users access many devices as well and corporate data and app accesses on these devices must also be protected by IAM. Compact Identity can manage accesses and corporate data on many devices and is constantly growing to include more.

  • Manage access to endpoint devices
  • Centralized management with cloud Identity Store
  • Cloud-based policy enforcement for remote devices
  • Prevent data breaches and unauthorized access with MFA

Privilege Access Management

High-level accounts with entitlements to critical functions such as writing cheques for large amounts require a different level of security. PAM is a luxury IAM offering from select vendors, but, in truth, it is critical to your business’ security. Compact Identity includes PAM in its base offering at no extra charge.

  • Live session recording and monitoring
  • Access Request and Approval workflow
  • Comprehensive reporting
  • MFA