Vizor Complete

Information Security is responsible for anticipating and countering attacks on the organization from unscrupulous competitors and personally motivated individuals. If InfoSec is to succeed, it needs collaboration across the organization.

  • Secure IT provisioning for new hires
  • Contunous security through Role Changes
  • Information Security in Terminations
  • Information Security Audit

Vizor makes collaboration possible. In fact it virtually enforces it, by structuring communications and workflow between Information Security, IT Operations, HR and IT users.

Secure provisioning IT for new hires

Vizor’s New Hire Workflow ensures employees meet security clearance and are allocated appropriate levels of access.

  • The Role-based Resource Catalog ensures that business managers can request only appropriate privileges.
  • Vizor New Hire Provisioning Workflow ensures all security checks associated with the new hire’s role are completed. It maintains records of who managed the checks and when.
  • Exceptional requirements for clearance are processed through Authorization Workflow.

Continuity of Information Security through Role Changes

In dynamic organizations it is all too easy for access privileges to get out of synch through inadequately managed changes of role. When employees change role, the emphasis is always on what new access rights they need, and rarely on what they no longer need. Employees accumulate security privileges by default.

  • Authorization Workflow actively enforces continuity of security through provisioning changes.
    Vizor records the request and justification for each change in access privileges.
  • Batch mode handles bulk changes of privileges for groups such as medical student hospital interns.
  • Vizor’s Application and Information Access Management Portal provides IT Operations, Information Security and Business Managers with a shared view of the history of all application and information access privileges.

Information Security in Terminations

Lack of process and failure to act promptly around termination creates an information security risk.

  • Vizor alerts the InfoSec team to every requirement for privilege termination.
  • Requests to cancel privileges can arise as disruptive emergencies. If appropriate, Vizor’s IAM Automation will automatically manage the closure and/or redirect of AD and email accounts.

Information Security Audit

The organization requires traceability of access privileges. Vizor’s Information Security Report Suite provides summary and drill down analysis of access privilege allocation and termination, by IT user, by Role, and by Information Access Resource.