Role Expert Enterprise Role Management Business Role Management---Used for Role Definition,Role Documentation(Owners,Approvers,Business Processes,Sub business Processes),Perform Risk Analysis(From the Access Risk Analysis/Compliance Calibrator tool where the Risks are maintained--RISKS,Conflicting Transactions,Criticals Transactions,Roles and Profiles). we are defining the Roles in PFCG earlier,Now the Roles are defined using BRM Tool and Generated for Maintenance automatically using the Option "Generate". it is also possible to Compare the BRM Database and PFCG Database. Access Risk Analysis(ARA): it is used to Provide various Reports of Users with Conflicting Transactions,SOD Risks,Critical Transactions,Critical Roles,Profiles etc. it is used to maintain RISKS,Business Processes,Conflicting Transactions,Criticals Transactions,Roles and Profiles. it is also used to Define the Mitigation Users,Mitigated Roles and Remediate them by assiging the Approvers and Monitors. Approvers and Monitors receives the mail,log as soon as the Mitigated Risks are accessed by the User. FireFighter(FF) SuperUser Previlage Management(SPM) Emergency Access Management(EAM) it is the process allowing a normal User to perform the tasks beyond the control under the supervision of Role Ownerand Role Controller /n/virsa/vfat. Firefighting is a term used to describe the ability to perform tasks in emergency situations. The Firefighter application provides the ability to allow personnel to take responsibility for tasks outside their normal job function Access Request Management (ARM) it is used to create users and assign roles after necessary approvals ARM automates the access provisioning approval process by linking the request with workflows. When a user (Requester) makes an access request to resources for which they do not have permission or need access to, ARM automatically forwards the access request to designated managers and approvers within a pre-defined workflow. This workflow is customized to reflect your company’s policies. Roles and permissions are automatically logged to the enterprise directories when the access requests are approved for future reference and audit purposes. ARM ensures corporate accountability and compliance with Sarbanes-Oxley (SOX) along with other laws and regulations.