The Information Security Report delivers audit-ready reporting. Based on the ISO 27001 standard it enables you to meet ongoing compliancy requirements and to reduce the cost for security audits significantly.
The Audit Report detects security and compliance issues including insider abuse policy violations and application availability.
Key features and benefits
- Enterprise Information security Policy
- Distribution list for the Audit Report
- Job Roles
- System Permission and Permission to App Extensions
- Users, Systems, State, License Type Created and Modified
- List of All Enabled users without Job Roles
- List of All Disabled users