World-Class, Economical, Intelligent IAM for Every Organization
We make Identity and Access Management an exhilarating experience.
We change old IAM paradigms through innovation.
We continue to work with our customers beyond technology implementation.
We do not force fit one product for every customer.
Through providing value added services to traditional IAM solutions, we keep in touch with customer realities.
We enable you choose the right solution, sometimes even if it is from our competitor
Why Compact Identity?
For the first time there is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons. This includes Access Management as well as Identity Governance and Administration.
A unique online digital guidance system helps you implement the solution step-by-step and at your own pace. Unlike other vendors, Ilantus also offers implementation support as per your needs at no extra charge.
Single Sign On
SSO to any app
Seamless SSO with ‘no app left behind’, including on-premise and thick-client apps. Web apps, federated, non-federated, thick-client, legacy or custom apps – will all be included in your SSO environment. Mobile apps and IOT devices are supported too. Homegrown app? Our interactive digital help guide ensures that this will not be an issue. And, if you need assistance with it, call Ilantus’ dedicated helpline available 24 hours from Monday to Friday and we will do the integration for you.
Database of commonly used apps, pre-configured, and ready to download. Custom or homegrown apps can be integrated easily.
Experience superior optimization when each app launches in its preferred browser – a simple configuration that only takes a few clicks.
Shared App Login
Save money by sharing app licenses. Compact Identity can allow multiple employees to use a single license during different sessions, and yet protect the app password from all the users. Accountability for all users of a license through audits is also supported
Compact Identity comes with a Universal Directory at no extra cost. AD licensing is expensive. If your business doesn’t feel the need for an AD at all or only wants to create AD accounts where they are required, the Universal Directory is the cost-effective way to create identities in your IT environment.
Authentication verifies that a user is who they say they are when – accessing a target application/system, recovering a forgotten password and unlocking an account.
This is possible with step up or multiple authentication mechanism factors (MFA) such as:
- What the user knows – Password, Challenge Response
- What the user has – Email / SMS OTP, Soft Tokens
- What the user is – Biometric
Risk based Authentication
Compact Identity uses real time intelligence to calculate a user’s risk score based on factors such as device, location, and network connection. The system then associates a risk rating based on the context and decides to:
- Allow the user access or
- Prompt another level of authentication or
- Simply deny the access if the risk score is high
Compact Identity possesses the most comprehensive password management system anywhere in the industry. Not only does it provide capabilities to reset forgotten passwords, it also synchronizes passwords from apps that are not connected to your AD.
Eliminate wasted time and avoid confusion when passwords that are changed or reset within Compact Identity, or within apps, are synced with one other.
- Forward Password Sync: Password changes in Compact Identity are synced with your AD
- Reverse Password Sync: AD password changes are synced with Compact Identity
Password Reset – Helpdesk Assisted
Empower your Helpdesk to perform password resets from their end, utilizing the Compact Identity interface.
Password Reset – User Initiated
We all forget passwords and even when we don’t, we must change them from time-to-time for security reasons. Our solution allows you to reset forgotten passwords at any time or change passwords on a schedule.
Today, perhaps the most important part of an IAM solution, is Identity Governance. This technology allows you to govern your identities and accesses for complete compliance and audit control. Unfortunately, access management solutions in the market offer only shallow identity governance capabilities. Compact Identity, however, offers this at the deepest possible level. It even utilizes advanced analytics and business intelligence to power up your dashboards and display the most critical identity and access parameters on the fly.
Compact Identity enables your employees to request accesses to roles, apps and entitlements by themselves. Users can see the risk score of an entitlement they are requesting, whether their peers have such accesses, their chances of getting it approved and the average turnaround time for access to be granted. This intelligent decision-making guidance increases the efficiency of what would normally be a simple but frustrating mechanical process.
Self-service Access Request
To roles, apps, entitlements (supported with analytics and system suggestions) and request for any attribute to reduce risks
Get set with multiple levels to approve a high-risk access
Supported by analytics and risk metrics, enable managers to take right decisions by providing required information on the fly.
Allow managers to delegate if not confident in taking decision
A safe business not only utilizes a secure access provisioning system but reviews access rights regularly. Our solution automates user access reviews and, if configured, revokes accesses that are no longer suitable, or, pushes notifications to various target systems for managers to review. Compact Identity pushes the details of access reviews that are scheduled to be performed to managers, owners, or security specialists in non-technical language that is easy to understand.
Regularly monitor ‘who has access to what’
Reassess the appropriateness of accesses at specified intervals
Ensures that all access that are no longer required are terminated
Orphan Account Identification and Management
Sometimes accounts can become ‘orphaned’ when they no longer have a valid user. Such accounts present a critical security risk because they can be used and accessed without any person being accountable for actions performed within these accounts. Compact Identity detects orphan accounts and enables admins to delete them. This automation also saves your business money by freeing up licenses.
Choose from a host of pre-configured reports. Or, customize reports for exclusive needs. View these reports on your dashboard with trends and other analyses.