access rights management with 8man
Transcription
Access Rights Management. Only much Smarter. ACCESS RIGHTS MANAGEMENT WITH 8MAN Access Rights Management Access Rights Management prevents unauthorised access to sensitive company data and optimises security related processes across your organisation. PERMISSION ANALYSIS In order to effectively address security risks, you first need to be aware of them. 8MAN analyses the permissions structure in your organisation and gives you clear answers on who has access to which resources. You can clearly see all access rights to file servers, SharePoint, Exchange and vSphere in one intuitive interface, including all Active Directory group memberships. This information empowers you to act and prevent critical security breaches in your organisation. 8MAN gives you back control. One click on your resource view shows the current access rights situation, including all employees and the rights they have been assigned. DOCUMENTATION & REPORTING 8MAN creates reports that are truly needed. Auditors are impressed when you can show them any employee’s access rights on one screen, with the click of a button. CEOs are relieved when they know who exactly can access the “Employment Contracts” folder. Our reports are extremely intuitive, can be easily configured with just a few clicks and can be automatically scheduled and sent to designated people. The creation of a report requires only two simple steps: Defining which resource should be analysed, and in which format it should be generated. SECURITY MONITORING Whether Active Directory or file server environments, your employees make changes more or less constantly. Without comprehensive monitoring, organisational risk of sensitive data breaches increases significantly. Our 8MATEs AD Logga (for Active Directory) and FS Logga (for file servers) ensure that all security related incidents are captured throughout your company network. This allows you to understand and document what changes were made, which files were accessed and who accessed them. Understanding patterns of behaviour and access across your network enables the optimisation of processes and best practice guidelines, further reducing critical security risks. ROLE & PROCESS OPTIMISATION Data owners play a key role in 8MAN’s security philosophy. They are the ones that create and use data day in, day out. Administrators, on the other hand, are often poorly equipped to understand which documents contain sensitive information. By introducing role based concepts for the assignment and analysis of permissions, you enhance security awareness across your organisation. 8MAN’s Data Owner concept breaks your company organisation down by department and assigns responsibility for employees and resources to designated data owners, who actively grant and revoke permissions. Our 8MATE GrantMa even allows you to setup additional workflows where your employees can request permissions themselves. These requests are then approved or rejected by the responsible data owner. USER PROVISIONING Role based templates allow you to setup new users within seconds and in line with standardised best practice procedures. Setting up Email accounts simultaneously means no time is wasted during the on-boarding process. All events can be scheduled and automatically revoked, ensuring that project based permissions are only assigned temporarily. 8MAN allows Data Owners and help desk users to play a meaningful part in the rights assignment process without requiring full administrative rights. 8MATEs Overview: SECURITY MONITORING ROLE & PROCESS OPTIMISATION 8MATE AD Logga 8MATE GrantMA 8MATE Alerts 8MATE FS Logga INTEGRATION PROGRAMMING INTERFACES 8MATE for Exchange 8MATE for vSphere 8MATE for SharePoint 8MAN | Protected Networks GmbH T: +44 020 7097 1602 E: info@8man.com W: www.8man.com Distribution by: 8MATE Web API
Similar documents
8MAN Enterprise Brochure
DOCUMENT MANAGEMENT / SHAREPOINT / CARD MANAGEMENT / ASSET MANAGEMENT / HELP DESK / SOFTWARE DELIVERY / IT COMPLIANCE / PCI-DSS & ISO.
More informationss rights management data security m anagement
decided to put our focus on the visualisation of access rights so that each company can get an understanding of its internal structure and complexity. This visualisation makes it easy for clients t...
More information8MAN proof of concept - Oxford Computer Group
Looking to the future, you can keep your AD healthy and secure, as well as control access to critical resources such as file servers, SharePoint, Exchange and VMware. Our health check significantly...
More informationWhen you apply for a job, you will often be... covering letter. This explains: How to write a compelling statement
More information
8man version overview
SECURITY MONITORING Active Directory Monitoring Tracks all Active Directory changes. All activity is captured in the 8MAN log book and/or generated as a report.
More information