You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Avigilon
How would you rate your experience with Avigilon Unity?
Self Service Access requests
Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
10 reviewers of Avigilon Unity have provided feedback on this feature.
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs
Compliance Audits
Proactively audits access rights against policies
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Mobile App
Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Data Protection
Enable users to protect their data from potential outside attacks.
Remote Access
Allow users to control access to their information from a central point.
Network Access
Allow users to implement policies for controlling access to their business's infrastructure.
Security
Secure access to your network for both guests and internal users
Scaling
Scale network visibility to whatever your businesss requires.
Audit
Audit your network's assets.
Processes
Enable users to implement various processes.
Blockage
Ability to block unwanted outside access.
IoT
Track all IoT assets.
Turnkey
Provides a fully managed system that you can set and forget.
Compatibility
Gives users a system that is compatible with existing cameras.
Integrations
Allows for integrations with other systems (e.g. access control, POS).
Load Balancing
Automatically load-balances resources between all your network video recorders (NVRs).
AI-Based Search
Gives the ability to quickly isolate relevant footage.
Object Detection
Detect objects in video.
Workflow
Create workflows with video footage.
Storage
Provides adequate storage for video footage.
Alerts
Create alerts based on motion, noise, etc.
Video Access
Easily access your video footage from any device, anywhere.
Allows for different levels of permissions based on user type.
Dashboard
Provides a dashboards users can use to view video footage.
Analytics
Provides users with analytics of video footage.
Collaboration
Securely share the video with whoever needs to see it.