Identity governance with automated provisioning, deprovisioning, entitlement management, policy enforcement, etc. It controls access to resources by monitoring user behavior and detect suspicious behavior and take actions accordingly.

Step 1 of 1