Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

EmpowerID

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporates both Business Process Management (BPM) and Role-Based Access Control (RBAC), EmpowerID offers flexible workflows that automate multi-system user provisioning, information synchronization, password synchronization, identity administration, de-provisioning, and compliance. EmpowerID's self-documenting and auditable workflow processes can manage the entire lifecycle of a user's identities and their associated credentials.

EmpowerID is not a typical "fire and forget" provisioning system. EmpowerID manages user identities as RBAC-protected Resource Entitlements throughout their lifecycle. Unlike traditional systems, where roles act as templates to determine the accounts to provision and the initial group membership, EmpowerID provides continuous enforcement of RBAC policies to automatically provision, move, or de-provision user accounts, control group membership, and secure resource access, based upon changes to a user's role or business location.

EmpowerID Identity Lifecycle Management Solutions:
  • Role-Based User Provisioning / De-Provisioning
  • Multi-Directory Password Synchronization & Self-Service Reset
  • Multi-Directory Information Synchronization & Self-Service
  • Delegated Identity Administration

EmpowerID's comprehensive, Identity-Based, Business Process Management suite provides organizations with the visibility, auditing and enforcement of the identities, roles and resources that they demand.

  • Multiple Quickstart solutions for automating your key Identity Management processes quickly and easily, including: user and mailbox provisioning, password management, whitepages, delegated user and group management, and more
  • Supports multiple Active Directory domains, un-trusted forests, Microsoft AD/AM, LDAP, and a variety of system connectors that extends Active Directory security to non-Microsoft systems
  • Rich and intuitive graphical interfaces accelerate user acceptance and adoption
  • Built on a robust platform based on Microsoft technology and utilizing visually designed workflows customizable to your specific business needs
  • Powerful Role Based Access Control (RBAC) technology simplifies managing users and resources in complex enterprises
  • Provides continuous enforcement of a single role-based security model across all enterprise resources
Rating
5321reviews
2 votes
Favoured:
0

Listing Details

Vendor
The Dot Net Factory
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2009-08-14
Owner
michelemjordan
Created
2009-08-14
  • 240.jpg
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
    • - Anti Spam Mail Servers
    • - Wireless IDS
    • - Telephony Firewalls
    • - Identity and Acces Mgmt
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message