NetIQ Access Manager provides authorized users with intelligent access to secured applications and information based on who they are, what devices they are using and where they are located. Because NetIQ Access Manager enables identity federation, it simplifies access for partner and customer applications.
To learn more about NetIQ Access
Manager, or to start a trial, go to: http://bit.ly/AccessManager
1. Product Brief
NetIQ Access Manager
Regain access control to resources you don’t control
Control who has access to what Product Overview Solution
Access Management
across your physical, virtual, mobile NetIQ® Access Manager™ provides
and cloud environments, and secure authorized users with intelligent access
resources both inside and outside to secured applications and information Product
based on who they are, what devices they NetIQ® Access Manager™
the firewall. are using and where they are located.
Because NetIQ Access Manager enables
NetIQ is a leader in providing web single identity federation, it simplifies access NetIQ Access Manager is a
sign-on solutions that delivers transparent, for partner and customer applications.
secure access to data and applications. best-of-breed solution for
We pioneered the use of federation so Designed to use less hardware, NetIQ securing and controlling
businesses can interact easily and share Access Manager is quick to deploy and access to inner web, as well
private information with their partners easy to maintain, for faster time to value as cloud-hosted applications
as well as personalize their customer’s and lower cost of ownership. The latest
experience. To share private information and resources.
version is twice as fast as previous versions
without risk, businesses and organizations and four times as scalable—and you can
need to control access for both their own deploy it as a virtual appliance without
users as well as other collaborating users losing performance or scalability.
outside their own domain.
Granting secure access is more than just
Capabilities
knowing who needs it, but enforcing the • Provides access to authorized users from
right access based on the device being wherever they are located
used, where the user is located, as well as • Manages mobile application and
the time of day or night when the user is information access for iOS 5 devices (iPad
making the request. IT needs to respond and iPhone)
to requests for access at the speed of • Provides access only to the resources users
business without compromising security need to do their jobs
(nobody wants to be front-page news). • Revokes network access in minutes rather
And yet the challenge has never been than days
greater because IT access and security • Enables user single sign-on by managing
teams must support diverse applications multiple passwords for web applications
across more devices than ever before. • Protects users’ privacy and confidential
information as they access partners’
resources
• Proves compliance to your business
policies and regulatory requirements,
such as Sarbanes-Oxley (SOX) and
HIPAA/HITECH