- The next generation of access governance focusing on administering and optimizing access policies, segregation of duties, and anomalies in the use of access
- Near real time monitoring and reporting on policy adherence and access policy violations
- Collects user activity information from various sources and applies patterns, behaviors, historical data and intelligence to identify and act on
- Insider threat
- Excessive or rogue access