Visual Identity Suite Datasheet

Visual Identity Suite (VIS)

Divider text here
Use cases and problems solved by VIS
dOWNLOAD pdf
Organizations are faced with a constant set of challenges involving the management of the employee lifecycle. Generally, these challenges involve visibility into, and accountability to verify that user accounts have proper access to applications and systems that allow proper job function. 

However, available tools and procedures are often antiquated and require manual administrator intervention; as a result, there are often undiscovered errors and inadequate processes to resolve errors, pertaining to the management of Identity and Governance of the end user.

To help solve these issues, Core Security has addressed 2 critical parts of the IGA process, surrounding: 
  • The Creation of Roles within an organization 
  • The Certification of proper access to endpoint systems

Core Security’s Visual Identity Suite (VIS) solves these issues by providing tools that tackle these problems independently, as described below.

VIS Role Management: Use Cases

Divider text here
The VIS Role Management specifically targets the role administrator; its primary use case is the accurate identification and definition of roles (account to entitlement groupings) within an organization. 

The primary problems Role Management solves are visibility into and accuracy of, user-to-entitlement associations. Administrators are tasked with “making employee X’s entitlements be the same as pre-existing employee Y”, while having little visibility into employee Y’s current entitlements, and more importantly, whether Employee Y has the correct entitlements for his/her role. By providing admins with tools that allow a quick view into both of these items, VIS Role Management enables both speed, accuracy and most importantly, efficiency in the role-creation process.

Role Management provides a graphical representation of entitlements and accounts associations. The graph allows administrators to quickly ascertain what entitlements are associated with certain accounts, by sorting these associations via numerous key values, including Department, Job Title, Manager and/or Target system. Admins can quickly review the associations and pinpoint both ‘core’ entitlements associated with a role, while highlighting outlying entitlements. Administrators can then define what the core organizational roles are within VIS Role Management, and kick off de-provisioning processes for outlying entitlement-to-role findings.

Key Use Cases

Divider text here
  • Quick, easy to understand UI - An intuitive graphical role mapping results in quicker, more efficient and error-free role creation.
  • Simplified provisioning - Less time wasted in the provisioning process within companies, with more time spent empowering personnel to be productive. 
  • Automate data collection and association - Provides immediate value by allowing traceability and accountability, which results in less overall risk incurred by the organization.

VIS Access Certification: Use Cases

Divider text here
The VIS Access Certification application completes the cycle of account-to- entitlement associations by providing an easy-to-use interface that facilitates the creation and management of certification review cycles required by most organizations. 

The core problem encountered: certification is a lengthy, most often, manual, process, further complicated by the dearth of proper tools to manage. Managers are often provided lengthy spreadsheets with user-to-entitlement mappings, for their approval. This is further complicated by both the exclusion of proper context (with little to no feedback pertaining to why a user, role or entitlement has been configured organizationally in the way that it has) as well as the existence of unseen, ‘hidden’ entitlements; the lack of visibility into these provides at best, a process that provides erroneous certification results, while at worst, creates a large security hole in the organization. Managers confronted with this unwieldy process often “wait until the last moment” and simply “certify” all entitlements as correct, with little or no review, creating even greater risk. 

Access Certification solves these issues by providing a powerful graphical tool that unravels hidden entitlement associations, quickly groups like users and entitlements, while providing an interface to approve, deny, investigate or delegate certifications. Access Certification also can quickly re-calculate and filter information, providing quick access to view data from different angles, allowing managers to make informed decisions about the entitlements they certify. The tool also provides reporting/ attestation, for audit purposes, and is used to kick-off provisioning or deprovisioning processes, as required by the organization.

Key Use Cases

Divider text here
  • More secure work environment - Access to the correct systems is only provided to the correct personnel, at the right time, which results in less risk of breaches. 
  • True access auditing capabilities - Keeps organizations true to the main reasons why they audit in the first place: security and accountability. 
  • Easy-to-use graphical interface - VIS offers a graphical interface that allows users to quickly change views on data extracted from an organization which allows managers to make accurate decisions in a fraction of the time that is normally required using alternate methods, resulting in greater productivity and more security.

See It in Action

Divider text here
See how these products work together to accelerate role design and ensure certification accuracy.
Request a Demo
© HelpSystems, LLC. All trademarks and registeredtrademarks are the property of their respective owners