Audit and Compliance

Activate provides a robust workflow and automation engine that ensures that your network and security is managed from request to implementation.

All actions are logged into the Activate database and are available for reporting and audit analysis. Activate's business oriented workflow and approvals mean that corporate policies are enforced each and everytime.

  • Reporting

    End to end processes from Request, through to business approval and finally automated fulfillment mean that Auditors and Security personal can be sure that security and compliance processes are being followed. This information is available in the Activate database through built-in reports as well as ad-hoc reports using SQL Reporting Services.
  • Reduce Compliance Costs

    Audit and compliance costs can be significant in large corporate environments, external auditing requirements, along with Sarbanes–Oxley Act (SOX) and (Health Insurance Portability and Accountability Act ) HIPPA can be complex and onerous to do manually. Activate automates the capture and reporting on this information.
  • Increase End User Satisfaction

    Automated access and provisioning, along with integrated end user request processes means that it is quick and easy for users to get what they need, when they need it. This significantly increases end user satisfaction with IT and means that the IT organization can focus on adding value rather than performing repetitive tasks that can be automated.



Audit and Compliance Functionality

Automated Processes

Activate implements end to end automated processes. This removes the possibility of manual errors and ensures that corporate policies are enforced.

User Audit Logs

All significant actions are logged against users, meaning that a single view of all the changes to a user account can be found in one place.

360 Degree view

In conjunction with AD Compliance Manager, Activate can monitor all changes to Active Directory and enforce corporate policies even if the action is performed outside of Activate.

Request Audit and Logging

Activate logs all information associated with a request and all actions performed. For example, Submit User, Target User, Requested Item(s), Submit Time, All Approver information along with detailed logs of all actions performed by the system.



Please contact your Activate representative for a demo or for more information on how Activate's Audit and Compliance solution can help your organization.