Detailed views of user activity
NetIQ Identity Tracking maps multiple system entitlements back to a specific user. This information is displayed in an intuitive user interface that gives business managers a complete view of a user’s privileges and helps them make informed decisions about provisioning and access requests.
Clear, concise monitoring
With NetIQ Identity Tracking, you can automatically monitor activity in key systems in real time and take necessary action when suspicious or non-compliant activity occurs. You can also correlate potential threats and violations with actual users, identifying how users got their access to key systems.
Real-time monitoring and remediation
Identity Tracking monitors user activity in key systems so that you can take immediate action if out-of-policy events occur. By combining user provisioning with security monitoring, Identity Tracking delivers business process automation that gives you the appropriate resources, validated in real time, to ensure compliance with company policies.
Identity Tracking allows you to see who has access to what key systems, and what they are doing with that access, all in real-time. This comprehensive reporting capability allows you an unparalleled, in-depth view into your enterprise.
Create custom security reports
In addition to standard reports, Identity Tracking also delivers the flexibility to create custom security reports. These custom reports allow administrators to specify criteria such as which users to include, what time frame to report on, and what kind of activities to cull.
Identity and security integration
Identity Tracking ties your identity management information to security events, giving you comprehensive compliance and unbeaten security across key systems.