How to modify ad-hoc analytics views of Evidian IAM (Identity and Access Management)

With Evidian Analytics and Intelligence

Demonstration of how to modify ad-hoc analytics views of Evidian IAM

Evidian's Analytics and Intelligence solution allows monitoring and analysis of the use of the identity and access management system.

As part of Evidian's dashboards, Ad-hoc views will help you to detect suspicious behavior and to improve governance and risk management. They can be used in dashboards but are also available on their own for consultation.

In this tutorial, we will see how to modify an Ad-hoc view in Evidian's A&I web portal.

How to modify an Ad-hoc view

With Evidian Analytics and Intelligence, highlight Key Risk Indicators (KRIs) to detect high-risk users, excessive access, dormant or orphaned accounts and abnormal user behaviors. And meet regulatory compliance with audit reports.

Analytics and Intelligence is the perfect add-on to Identity and Access Management (IAM).

Evidian Products - Protect your company from cyber attacks by unauthorized users

Identity as-a-service

Evidian takes care of everything related to your Identity and Access Management with IDaaS

Learn more   >

Identity Governance and Administration

Manage access and authorization of all your users in your company

Learn more   >

Web Access Manager

Gateway for web apps with SSO, multi-factor authentication, identity federation

Learn more   >

Analytics & Intelligence

Monitoring and powerful reporting for regulatory compliance

Learn more   >

Authentication Manager

Authentication Manager

Enterprise multi-factor & passwordless authentication on Windows PCs

Learn more   >

Enterprise Single Sign-On (SSO)

Secure access to legacy and web apps on PCs & mobiles with SSO

Learn more   >

Self Service Password Reset (SSPR)

Reset Windows passwords online and offline

Learn more   >

SafeKit

High availability software for Evidian and partner applications

Learn more   >

Evidian IAM leader in the French and German markets and in U.S. Public Sector

What are IAM cyber security tools and solutions?