Notice: quest.com will be retired soon. Please visit our new site at software.dell.com

Access Governance

Protecting Business-Critical Information with User Access Controls

Providing employees with the right access to business-critical information should be managed by the business and not by IT. That’s why Dell One Identity empowers the business to govern the access necessary to operate in an agile and effective manner, while reducing the burden on IT.

For access governance Dell One Identity gives you the visibility and control necessary to:

  • Understand what you have in your environment and who has access to it.
  • Empower business managers to understand what employee entitlements actually mean and certify access accordingly.
  • Establish a continuous process to ensure that every individual has the right access to do their job, nothing more

Review the capability categories below to find a solution for your specific IT challenges.

Access Certification

Dell One Identity overcomes some of the biggest challenges associated with access attestation and recertification – namely the conflict between IT’s ability to gather the information (but lack of understanding of the actual business needs associated with entitlements) and the business’ understanding of who should access what (but lack of visibility into the actual systems and technologies that control entitlements). Learn more »

Access Request & Fulfillment

Dell One Identity provides an end-to-end solution for the entire lifecycle of providing employees with the access they need to do their jobs. One Identity automates request and fulfillment to move these processes out of the hands of IT and into the hands of the business. Learn more »

Continuous Access Governance

Dell One Identity provides a closed-loop approach to access governance that ensures complete adherence to established policies and controls in the hands of the right people.

Data Access Governance

Dell One Identity automates multi-platform data access governance to satisfy compliance requirements and quickly address security threats – and prevent them in the first place! Learn more »

Enterprise Provisioning

Dell One Identity enables automated, codeless, business-driven provisioning of user identities and access privileges enterprise-wide. One Identity adds identity intelligence to provisioning to overcome the typical security, cost, deployment and complexity limitations of “traditional” IAM frameworks at a fraction of the cost and deployment burden. Just-in-time provisioning to software-as-a-service (SaaS) applications, such as Salesforce.com, Google Apps and Office 365.

Identity & Access Synchronization

The Dell One Identity synchronizes identity data (users, groups, passwords and supporting data for roles) enterprise-wide to support a unified and intelligent approach to identity and access management.

Identity Intelligence

Dell One Identity consolidates all roles, actions, policies, rights and resources into a single, well-controlled and flexible IAM structure that adjusts as needs and systems evolve. One Identity provides you with control and a clear view of all IAM components, enabling you to make sound decisions based on real-time intelligence, thus reducing risk. Learn more »

Role Management

Dell One Identity helps you control access by providing an optimized structure with automation to address all of your enterprise role management needs. One Identity enables you to granularly define and administer roles, as well as attach business-driven access control, policy, workflows and attestations to roles in order to meet security, efficiency and compliance objectives. Learn more »

Browse the technology platform categories below to find solutions for your unique IT challenges.

Access Certification

Dell One Identity overcomes some of the biggest challenges associated with access attestation and recertification – namely the conflict between IT’s ability to gather the information (but lack of understanding of the actual business needs associated with entitlements) and the business’ understanding of who should access what (but lack of visibility into the actual systems and technologies that control entitlements). Learn more »

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Business-driven Attestation

One Identity moves access certification away from IT and firmly into the hands of business managers. With One Identity, those that are in the know, now have quick and easy access to all the information they need to confidently review and certify access rights across the entire enterprise.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Access Request & Fulfillment

Dell One Identity automates the process of approving access requests according to established security and compliance policies. Using identity intelligence, an intuitive interface allows access requests to be processed immediately through a complete workflow that includes all required approvals, audit trails and notifications. One Identity eliminates the delays and errors associated with IT-driven access request and fulfillment.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Visibility for Business Managers

One Identity gives business managers complete visibility into what their employees have access to (in terms they understand). Views are automatically generated based on manager role, need-to-know factors and with a close eye to separation of duties and established policy.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Detailed Recertification

One Identity not only shows managers “what” their employees have access to, but it also provides complete drill-down details that make recertification even more accurate. One Identity augments the “what” of access certification with a view into how the employee got the access in question, who approved it and when, and even why that access was granted in the first place.

Access Request & Fulfillment

Dell One Identity provides an end-to-end solution for the entire lifecycle of providing employees with the access they need to do their jobs. One Identity automates request and fulfillment to move these processes out of the hands of IT and into the hands of the business. Learn more »

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Identity Self-Service

One Identity gives users and managers the ability to request access without engaging in an endless round of emails and phone calls. Familiar shopping cart interfaces (controlled by role-based rules) ensure that employees get what they need and managers keep employees productive from day one – with all necessary approvals and audit trails.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Automated Fulfillment

One Identity ensures that fulfilling access requests happens rapidly and completely without requiring IT intervention. One Identity’s modeled approach to IAM means that a single request, workflow and approval process results in a rapid and accurate provisioning of all required access.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Active Directory Edition
    Identity Manager Active Directory Edition empowers end users and managers to fulfill Active Directory group management and attestation via a simple and customizable request portal, reducing the burden on IT.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Configurable Workflows

One Identity overcomes the time, cost and functionality shortcomings of traditional enterprise provisioning solutions by leveraging a modeled approach to IAM. One Identity workflows are easily configured rather than entirely customized, which provides much quicker deployment times and dramatically increased flexibility. These fulfillment processes can include all the self-service, automated approvals, notification and fulfillment needs of even the most complex environments.

Continuous Access Governance

Dell One Identity provides a closed-loop approach to access governance that ensures complete adherence to established policies and controls in the hands of the right people.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Identity Dashboard Reporting

One Identity presents entitlement, request, fulfillment and certification data in clear, easy-to-understand dashboard displays. Dashboard views are role-based, enabling you to present each business manager with the data they need in a manner that is easy to understand, interpret, and actionable (right from the dashboard).

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Scheduled Governance

One Identity removes the manual, error-prone processes typically associated with IT-driven access governance. With One Identity, attestations can be scheduled to occur regularly, automatically generating the required data, presenting it to the appropriate mangers, and notifying all relevant parties of the required action.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Historic Reporting

One Identity augments the "who has access to what right now" reports required for recertification and provides complete visibility into the historical aspect of who has ever had access to a particular resource, and what any individual has ever had access to.

Data Access Governance

Dell One Identity automates multi-platform data access governance to satisfy compliance requirements and quickly address security threats – and prevent them in the first place! Learn more »

  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.
  • Site Administrator for SharePoint
    Understand, manage and secure your SharePoint environment and empower business content owners with Site Administrator for SharePoint's security trimmed, centralized management, security and reporting.

Discovery of Users & Resources

Who are your users? What resources (such as file shares) do you have in your environment? One Identity enables you to discover and document the extent of SharePoint, and identify unstructured or orphaned data.

  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.
  • Site Administrator for SharePoint
    Understand, manage and secure your SharePoint environment and empower business content owners with Site Administrator for SharePoint's security trimmed, centralized management, security and reporting.

Classification of Data & Access Rights

Classify data to identify whether it’s confidential, affected by any regulations (e.g., handling credit card numbers in accordance with PCI), and still relevant, or should it be archived? Determine who the business owners of data should be, and assess your identity and access management policies.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Assignment of Data Owners & Approvers

Assign the appropriate business owners of data – based on their roles, locations or other attributes. Going forward, the business owner will be the one to grant access, not IT. Perform the necessary checks for compliance to ensure separation of duties and establish automated workflow processes for future requests.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Enterprise Reporter
    Enterprise Reporter is a scalable solution for auditing, analyzing and reporting on the configuration of Microsoft Active Directory, Windows Server and SQL Server across the enterprise.
  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.
  • Site Administrator for SharePoint
    Understand, manage and secure your SharePoint environment and empower business content owners with Site Administrator for SharePoint's security trimmed, centralized management, security and reporting.

Access Auditing & Reporting

Schedule regular business-level attestation of access to ensure accuracy and security. Generate detailed reports for auditors to prove adherence to regulations.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.
  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.

Automated Access Requests & Problem Remediation

Use an access request portal so that users can request access to resources based on their role. Appropriate personnel can review the access to validate and implement automated responses that remediate any deviations from the rules.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Identity Manager-Data Governance Edition
    Protect the business by giving those who actually know who should access sensitive data the power to analyze, approve and fulfill unstructured data access requests.
  • InTrust

    InTrust securely collects, stores, reports and alerts on event data from Windows, Unix and Linux systems, helping you comply with external regulations, internal policies and security best practices.

Prevention of Unauthorized Changes

Secure sensitive data, groups or access rights that you want to ensure are never altered and set up real-time alerts to notify you if change attempts are made. Log all changes in a secure depository that can’t be altered, separate from standard event logs, for forensic analysis later.

Enterprise Provisioning

Dell One Identity enables automated, codeless, business-driven provisioning of user identities and access privileges enterprise-wide. One Identity adds identity intelligence to provisioning to overcome the typical security, cost, deployment and complexity limitations of “traditional” IAM frameworks at a fraction of the cost and deployment burden. Just-in-time provisioning to software-as-a-service (SaaS) applications, such as Salesforce.com, Google Apps and Office 365.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Codeless Provisioning

One Identity enables you to provision, re-provision and de-provision user accounts and group membership access to any system, platform or application within the enterprise (physical or virtual) with an emphasis on configuration rather than customization.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Automated Workflows

Initiate provisioning actions through business personnel requests and automatically fulfill the necessary actions based on established and proven workflows and approvals.

Just-in-time Cloud Provisioning

Just-in-time provisioning to software-as-a-service (SaaS) applications, such as Salesforce.com, Google Apps and Office 365.

Identity & Access Synchronization

The Dell One Identity synchronizes identity data (users, groups, passwords and supporting data for roles) enterprise-wide to support a unified and intelligent approach to identity and access management.

Group Sync

Synchronize authorization objects (typically groups) between directories in Active Directory, integrated applications or data sources.

Identity Sync

Synchronize identities (typically user accounts) to and from other systems enabling an Active Directory user to log onto non-Active Directory applications or data sources. Note: the PeopleSoft connector only syncs from PeopleSoft to other systems.

Password Sync

Set initial passwords during account creation, capture password changes in Active Directory and synchronize passwords between connected systems.

Identity Intelligence

Dell One Identity consolidates all roles, actions, policies, rights and resources into a single, well-controlled and flexible IAM structure that adjusts as needs and systems evolve. One Identity provides you with control and a clear view of all IAM components, enabling you to make sound decisions based on real-time intelligence, thus reducing risk. Learn more »

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.
  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Common Ground for IAM

One Identity provides a unifying model to establish and implement enterprise-wide policies and roles to ensure they are applied consistently and efficiently. This means that all IAM operations, such as provisioning, occur according to established rules and policies defined by the organization. A single set of controlling factors influences all of IAM enterprise-wide.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

360-degree Visibility

One Identity’s identity intelligence capabilities deliver a complete 360-degree view of all components of IAM, their relationships to each other, the policies and rules that affect them and the impact of changes to present and future IAM operations. With One Identity, business managers gain complete visibility into what their employees have access to – in terms they understand.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Business-optimized IAM

One Identity enables you to implement an IAM strategy that best suits your organization. Identity intelligence capabilities take into account your organizational structure and culture, operational requirements as well as existing (or new) roles, rules and policies.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Dynamic Adjustment

One Identity supports your continually evolving identity, policy and access requirements. The solutions' identity intelligence capabilities dynamically adjust with any change to your IAM environment. Access rights are automatically updated as roles evolve, new systems come online or new personnel are introduced into the IAM mix

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Relationship Correlation

One Identity enables you to easily and accurately correlate user identities, roles and policies to access requirements, systems and regulations. By establishing relationships between IAM components, access rights are automatically updated as roles evolve, new systems come online or new personnel are added.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Control through Intelligence

One Identity improves virtually any IAM operation by infusing a layer of identity intelligence, enabling you to optimize IAM for your environment, organizational needs and objectives. For example, enterprise provisioning is controlled by a common set of roles and policies that adjust dynamically to changes.

Role Management

Dell One Identity helps you control access by providing an optimized structure with automation to address all of your enterprise role management needs. One Identity enables you to granularly define and administer roles, as well as attach business-driven access control, policy, workflows and attestations to roles in order to meet security, efficiency and compliance objectives. Learn more »

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Role Management Automation

One Identity provides the structure and automation that enables you to unify roles enterprise-wide and use them to control access, improve security and maintain compliance. A simple and familiar interface streamlines and automates the tedious and error-prone process of managing roles manually or with traditional IAM framework solutions.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Flexible Role Structure

One Identity overcomes the major challenge of enterprise role management – the process of defining and executing roles – by delivering a powerful and extremely flexible structure upon which roles can be defined, correlated with user identities, tied to business-driven workflows and controlled through business-defined attestations.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Business-driven Processes

One Identity enables you to build access control based on defined and established roles correlated with business processes and needs. This flexible approach enables you to implement the amount of control that best fits your organization’s culture, regulatory burden and environment.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Role Lifecycle Management

One Identity automates and provides structure for the entire lifecycle of enterprise roles. You can easily and accurately create and modify roles, change their associations with specific access points and assign them to individuals.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Role-based Access Control (RBAC)

One Identity helps you implement role-based access control (RBAC) enterprise-wide through the establishment, execution and administration of strong role management principles. One Identity’s automation, structure and business-driven focus moves role-based access control from a difficult-to-achieve objective to a functional reality.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Role Mining

One Identity provides an abstraction layer that enables you to automatically use identities and their access rights to establish the appropriate roles. These automated role mining capabilities can define roles using statistical analysis, assign them to the correct individuals and even address necessary exceptions.

Get the most from your investment with help from our highly rated support team, training programs, and implementation services.