Identity Audit & Compliance Manager (Deep IACM)

Identity Audit & Compliance Manager (Deep IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Deep IACM does this by discovering deep into applications, databases and systems, where users and their access permissions are stored. While the typical process of discovering users’ access is just to determine whether the users were given specific access rights, Deep IACM, adopting ‘layered approach’, penetrates deeper to bridge the link between all the layers. This information is used for downstream processes such as attestation, compliance, role management, audit and reporting.

Read more

Identity Manager (Deep IM)

Identity Manager (Deep IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Deep IM is an add-on component to Deep IACM and shares the same repository.

Deep IM and Deep IACM share the same connector to manage user identity lifecycle, their access within enterprises applications and systems. Deep IM enables enterprises to have complete administrative capabilities right from hiring till the users leave the organization. The entire process is automated using integrated workflow.

Read more

Privilege Identity Manager (Deep PIM)

Privilege Identity Manager (Deep PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organizations.

Deep PIM is built as plug-ins on top of Deep Identity Manager (Deep IM) and comes with Privilege Access Server, which will act as proxy for access to back-end Windows and Unix servers. Deep PIM is an integrated solution with Deep IACM and Deep IM. Organizations now can take a practical and non-intrusive approach to address their Privilege Identity Management challenges including recording of sessions.

Read more

Data Governance Manager (Deep DGM)

Data Governance Manager (Deep DGM) provides complete automation for identity, data access governance and lifecycle management with the integration between other modules such as Deep IACM and Deep IM.

Deep DGM plug-ins include Windows and Unix file Servers, Microsoft SharePoint Portal and NAS devices.

Read more

Data Protection Manager Architecture (Deep DPM)

Data Protection Manager (Deep DPM) is the world’s first Data Loss Prevention (DLP) technology integrated with Data Access Governance (DAG) and Identity Governance & Administration (IGA).

While typical DLP solutions focus only on files and its data, Deep Identity uses the “layered approach” to inspect and analyze data providing real-time monitoring and take appropriate preventive actions taking into consideration the identity, access, file attributes including storage and data itself.

Read more