Collect privileges and identities to ensure continuous compliance between requests and provisioned identities, swiftly identifying any potential gaps.
Gather resources to ensure accurate documentation, establishing relations with other assets, privileges, and third-parties.
Collect third-party data, including invoices and metadata from compliance reports, to facilitate a comprehensive risk assessment and document relationships.
Providers and integrations support connectors for data retrieval.
Identity Governance | Asset Management | Third-Party Management | ||
---|---|---|---|---|
Amazon Web Services (AWS) |
|
| - | |
Apple App Store Connect |
| - | - | |
Atlassian |
| - | - | |
Atlassian Trello |
| - | - | |
AWS IAM Identity Center |
| - | - | |
Cloudflare |
| - | - | |
DigitalOcean | - |
|
| |
featureOS |
| - | - | |
FreeScout |
| - | - | |
GitHub |
|
| - | |
Google Analytics |
| - | - | |
Google Cloud |
|
| - | |
Google Workspace |
| - | - | |
K/Superviso |
| - | - | |
Microsoft |
|
| - | |
MongoDB Atlas |
| - | - | |
Octopus Deploy |
| - | - | |
Pipedrive |
| - | - | |
SendGrid |
| - | - | |
Sentry |
| - | - | |
Slack |
| - | - | |
SonarCloud |
| - | - | |
Vultr |
|
|
| |
WordPress |
| - | - |