Why Compact Identity?
For the first time there is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons. This includes Access Management as well as Identity Governance and Administration.
A unique online digital guidance system helps you implement the solution step-by-step and at your own pace. Unlike other vendors, Ilantus also offers implementation support as per your needs at no extra charge.
Single Sign On
SSO to any App
Seamless SSO with ‘no app left behind’, including on-premise and thick-client apps. Web apps, federated, non-federated, thick-client, legacy or custom apps – will all be included in your SSO environment. Mobile apps and IOT devices are supported too. Homegrown app? Our interactive digital help guide ensures that this will not be an issue. And, if you need assistance with it, call Ilantus’ dedicated helpline available 24 hours from Monday to Friday and we will do the integration for you.
Database of commonly used apps, pre-configured, and ready to download. Custom or homegrown apps can be integrated easily.
Experience superior optimization when each app launches in its preferred browser – a simple configuration that only takes a few clicks.
Shared App Login
Save money by sharing app licenses. Compact Identity can allow multiple employees to use a single license during different sessions, and yet protect the app password from all the users. Accountability for all users of a license through audits is also supported.
Compact Identity comes with a Universal Directory at no extra cost. AD licensing is expensive. If your business doesn’t feel the need for an AD at all or only wants to create AD accounts where they are required, the Universal Directory is the cost effective way to create identities in your IT environment.
Authentication verifies that a user is who they say they are when – accessing a target application/system, recovering a forgotten password and unlocking an account.
This is possible with step up or multiple authentication mechanism factors (MFA) such as:
- What the user knows – Password, Challenge Response
- What the user has – Email / SMS OTP, Soft Tokens
- What the user is – Biometric
Compact Identity uses real time intelligence to calculate a user’s risk score based on factors such as device, location, and network connection. The system then associates a risk rating based on the context and decides to:
- Allow the user access or
- Prompt another level of authentication or
- Simply deny the access if the risk score is high
Compact Identity possesses the most comprehensive password management system anywhere in the industry. Not only does it provide capabilities to reset forgotten passwords, it also synchronizes passwords from apps that are not connected to your AD.
Eliminate wasted time and avoid confusion when passwords that are changed or reset within Compact Identity, or within apps, are synced with one other.
- Forward Password Sync: Password changes in Compact Identity are synced with your AD
- Reverse Password Sync: AD password changes are synced with Compact Identity
Password Rest – Helpdesk Assisted
Empower your Helpdesk to perform password resets from their end, utilizing the Compact Identity interface.
Password Rest – User Initiated
We all forget passwords and even when we don’t, we must change them from time-to-time for security reasons. Our solution allows you to reset forgotten passwords at anytime or change passwords on a schedule.
Today, perhaps the most important part of an IAM solution, is Identity Governance. This technology allows you to govern your identities and accesses for complete compliance and audit control. Unfortunately, access management solutions in the market offer only shallow identity governance capabilities. Compact Identity, however, offers this at the deepest possible level. It even utilizes advanced analytics and business intelligence to power up your dashboards and display the most critical identity and access parameters on the fly.
Compact Identity enables your employees to request accesses to roles, apps and entitlements by themselves. Users can see the risk score of an entitlement they are requesting, whether their peers have such accesses, their chances of getting it approved and the average turnaround time for access to be granted. This intelligent decision-making guidance increases the efficiency of what would normally be a simple but frustrating mechanical process.
Self-service Access Request
To roles, apps, entitlements (supported with analytics and system suggestions) and request for any attribute to reduce risks
Supported by analytics and risk metrics, enable managers to take right decisions by providing required information on the fly.
Allow managers to delegate if not confident in taking decision
A safe business not only utilizes a secure access provisioning system but reviews access rights regularly. Our solution automates user access reviews and, if configured, revokes accesses that are no longer suitable, or, pushes notifications to various target systems for managers to review. Compact Identity pushes the details of access reviews that are scheduled to be performed to managers, owners, or security specialists in non-technical language that is easy to understand.
Regularly monitor ‘who has access to what’
Ensures that all access that are no longer required are terminated
Orphan Account Identification and Management
Sometimes accounts can become ‘orphaned’ when they no longer have a valid user. Such accounts present a critical security risk because they can be used and accessed without any person being accountable for actions performed within these accounts. Compact Identity detects orphan accounts and enables admins to delete them. This automation also saves your business money by freeing up licenses.
Choose from a host of pre-configured reports. Or, customize reports for exclusive needs. View these reports on your dashboard with trends and other analyses.
Managing the identity and access lifecycles of users manually is not only a cumbersome, low-productivity process, but also a security risk because the accesses of employees often remain enabled in most businesses, even after they are terminated. Modifying accesses for employees during promotions or transfers is also troublesome. Compact Identity is the most comprehensive answer to these challenges.
Self Service Access Request
Employees often need to access new roles, apps or entitlements as they grow in their jobs, and their projects become more complex. Compact Identity lets them request this on the go
Multi-Level Request Approvals
A single person approving an app, role or entitlement request works for most low-risk apps. But, what happens when access to an app also exposes a user to sensitive data or enables them to make high-impact decisions? In such situations, approval from multiple concerned parties is best. Compact identity allows you to configure multi-level workflows for an app to be approved.
Managers can handle access requests intelligently with support from analytics and risk metrics that are inherent in Compact Identity.
Save time and money and avoid confusion when our solution automatically creates user accounts with entitlements for new employees in target applications.
Promotions and Transfers
Promotions and transfers maximize a business’ employee investments. But, this comes with overhead. Our solution automatically manages access rights when an employee changes Roles/jobs within your company and thereby increases agility.
Protect your business and comply with statutory regulations when our solution automatically disables access to roles, apps, and entitlements as an employee quits or is terminated.
Analytics and Business Intelligence
Gain a multidimensional view of identity data in your company with Compact Identity’s advanced data mining and analytics.
- Advanced Data Mining and Analytics
- Provides business context to information
- Multidimensional views of identity data
- Provides comprehensive user administration and governance information
- Customizable Dashboards
In Compact Identity, for the first time in the history of IAM, ILANTUS has introduced dashboards which can be customized to any role. Security, compliance, IT admins, finance departments, managers, or employees all have requirements when it comes to what identity and access related information they need to view. Compact Identity has dashboards that are visually and logically customized to every role.
Consolidated Access View
In today’s IT security environment, knowledge is power, and organized knowledge is ideal. Our dashboard’s consolidated view shows individual and aggregate identity, and related access, information and statistics in the most concise and accessible way. The dashboard can be customized to different ‘user personas’ such as IT Admins, App Owners, IT Security, etc
Enterprise Mobility Management
With corporate staff using mobile devices for work on-the-go these days, it is critical that the company data is secure. Compact Identity monitors and controls data on corporate devices, locks apps and data on lost devices, and erases corporate information when employees quit or are terminated.
- SSO to mobile applications including OAuth & Open ID
- Auto install/uninstall apps when access rights are granted or revoked
- Control corporate data on registered devices
- Lock apps and data when devices are lost
- Erase corporate information as soon as employees depart
3rd Party Integrations
- OOTB integration to Microsoft Azure Access Management- add to your Microsoft access management all IGA features
- Integration with 3rd Party AM, IGA and PAM solutions
- Integration to leading endpoint management technologies to optimize security
- Integration with security tools such as SIEM, UEBA
- Utilize Compact Identity functions like authentication for your own services
- Manage all APIs securely and easily.
- Source of authentication to 3rd party applications
- OAuth ready – applications like Azure AD can SSO to Compact Identity
- API’s supported
- Add User
- Edit User
- Suspend User
- Restore User
- Delete User
With the proliferation of IOT devices in the workplace, it is becoming imperative that access rights involving these devices are properly governed. Compact Identity enables your business to do this easily. Another IOT business challenge is that many IOT devices lack proper authentication and Compact Identity solves this issue too.
- Manage login to IoT devices
- Create, suspend, delete IoT user access
- Supports all protocols: HTTP, XMPP, Web Socket, MQTT
It is not sufficient just to manage accesses to applications by simply granting or revoking them at appropriate times. These days, users access many devices as well and corporate data and app accesses on these devices must also be protected by IAM. Compact Identity can manage accesses and corporate data on many devices and is constantly growing to include more.
- Manage access to endpoint devices
- Centralized management with cloud Identity Store
- Cloud-based policy enforcement for remote devices
- Prevent data breaches and unauthorized access with MFA
Privilege Access Management
High-level accounts with entitlements to critical functions such as writing cheques for large amounts require a different level of security. PAM is a luxury IAM offering from select vendors, but, in truth, it is critical to your business’ security. Compact Identity includes PAM in its base offering at no extra charge.
- Live session recording and monitoring
- Access Request and Approval workflow
- Comprehensive reporting