Access Rights Manager

Manage and audit access rights across your IT infrastructure

4.0 1 Reviews
Visit website
Write a Review
Unclaimed Profile
SolarWinds Access Rights Manager (ARM) helps administrators quickly & easily provision, deprovision, manage, and audit user access rights to systems. By analyzing user authorizations and access permissions, you get visualization of who has access to what, and when they accessed it. Reports can easily be generated to demonstrate compliance with many regulatory requirements. Provision and deprovision users via role-specific templates to assure audit conformity in alignment with security policies.

Screenshot & Video



  • Cloud Hosted
  • Web-based
  • Windows


  • Phone

Knowledge Base

  • Help Guides
  • Video Guides
  • Blogs
  • Webinars

Access Rights Manager Core Features


  • Access Controls/Permissions
  • AI/Machine Learning
  • Compliance Management
  • Incident Management
  • IOC Verification
  • Reporting

Access Rights Manager Pricing

Pricing Type

  • Flat Rate

Free Version

  • Yes

Payment Frequency

  • One-Time Payment
  • Free
Vendor pricing page
  • 30 Days Trial

Plans & Packages

$1838 One-time

Access Rights Manager Reviews

4.0 1 Reviews
  • Relevance
  • Most Recent
  • Rating: high to low
  • Rating: low to high
Write a Review

Users can immediately detect attacks because of the system\'s centralized log collection

Rating Breakdown

  • Ease of Use
  • Features
  • Customer Support
  • Overall Rating

Share it on

Review Summary

At DigitalTriggers, we use Access Rights Manager. It is a cloud-based cyber security software from Solar Winds for threat detection, security strategy monitoring, and overall network protection. In addition, the integrity of your network may be monitored automatically, and the tool's intuitive UI can help you spot cyberattacks on your company in no time. Data loss prevention is at your fingertips with the help of Solar Winds' Access Rights Manager. Its purpose is to make it simple to build and evaluate access policies automatically. Users can immediately detect attacks because of the system's centralized log collection, user-friendly interface, and dashboard.

How frequently you use Access Rights Manager?


This profile is not claimed

Do you own or represent this business? Enter your business email to claim your GoodFirms profile.