• The next generation of access governance focusing on administering and optimizing access policies, segregation of duties, and anomalies in the use of access
  • Near real time monitoring and reporting on policy adherence and access policy violations
  • Collects user activity information from various sources and applies patterns, behaviors, historical data and intelligence to identify and act on
    • Insider threat
    • Excessive or rogue access