Are you spending a lot of man-hours on log reconciliation work? Introduction to privileged ID management solutions.
If you introduce the privileged ID management product "AccessMatrix UCM" (hereinafter referred to as UCM), you can implement the application/approval of privileged ID passwords through a web-based workflow, and all of those records will be saved as logs. However, there is no function to reconcile those logs with the logs of operations performed using privileged IDs. "Log compare for AccessMatrix UCM" is a privileged ID operation management solution that allows you to understand the usage status of privileged IDs and identify privileged IDs not managed by UCM by reconciling the logs of UCM with the logs of the systems managed by UCM. 【Main Features】 ■ Detection of unauthorized logins - Use of privileged IDs not managed by UCM ■ Detection of logins outside the designated period - Usage history of privileged IDs that deviated from the application period of UCM ■ Confirmation of logins within the designated period - Usage history during the application period by privileged IDs managed by UCM *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
【Operating Environment】 ■Supported OS: Microsoft Windows Server 2012 / 2012 R2 / 2016 ■Server Specs: CPU 4 cores or more / MEMORY 8GB or more / STORAGE 200GB or more ■Database: PowerGres 11 ■Supported Browsers: Google Chrome / Mozilla Firefox / Microsoft Edge (Chromium-based) ■Supported Privileged ID Management System: AccessMatrix UCM ■Managed Servers: Microsoft Windows Server 2012 / 2012 R2 / 2016 / 2019 *For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
【Purpose】 ■Understanding the usage of privileged IDs ■Identifying privileged IDs not managed by UCM *For more details, please refer to the PDF document or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company has earned strong trust and high evaluation from our customers by providing IT solutions for managing people, specifically integrated identity management. Leading with our fully in-house developed integrated identity management solution, we offer a comprehensive lineup that supports the reduction of operational burdens and the enhancement of information security measures, assisting our customers in solving their challenges.