Audit and Compliance

Activate provides a robust Workflow and Automation Engine that ensures that your network and security is managed from request to provisioning.

All actions are logged into the Activate Database and are available for reporting and audit analysis. Activates business-oriented Workflow and Approvals mean that corporate policies are enforced each and every time.

  • Reporting

    End to end processes from Request, through to business approval and finally automated fulfilment mean that Auditors and Security personal can be sure that security and compliance processes are being followed. This information is available in the Activate Database through built-in reports as well as ad-hoc reports using SQL Reporting Services
  • Reduce Compliance Costs

    Audit and compliance costs can be significant in large corporate environments, external auditing requirements along with Sarbanes–Oxley Act (SOX) and (Health Insurance Portability and Accountability Act) HIPPA can be complex and onerous to do manually. Activate automates the capture and reporting of this information
  • Increase End-User Satisfaction

    Automated access and provisioning, along with integrated end-user request processes means that it is quick and easy for users to get what they require, when they need it. This significantly increases end-user satisfaction with IT and means that the IT organisation can focus on adding value rather than performing repetitive tasks that can be automated

Audit and Compliance Functionality

Automated Processes

Activate implements end to end automated processes. This removes the possibility of manual errors and ensures that corporate policies are enforced

User Audit Logs

All significant actions are logged against users, meaning that a single view of all the changes to a user account can be found in one place

360 Degree View

In conjunction with the AD Compliance Manager Module, Activate can monitor all changes to Active Directory and enforce corporate policies even if the action is performed outside of Activate

Request Audit and Logging

Activate logs all information associated with a request and all actions performed. For example, Submit User, Target User, Requested Item(s), Submit Time, All Approver information along with detailed logs of all actions performed by the system

Please contact your Activate representative for a demo or for more information on how Activates Audit and Compliance solution can help your organisation.