access rights management with 8man

Transcription

access rights management with 8man
Access Rights Management. Only much Smarter.
ACCESS RIGHTS MANAGEMENT
WITH 8MAN
Access Rights Management
Access Rights Management prevents unauthorised access to sensitive company data
and optimises security related processes across your organisation.
PERMISSION ANALYSIS
In order to effectively address security risks, you first need to be aware of them. 8MAN analyses the
permissions structure in your organisation and gives you clear answers on who has access to which
resources. You can clearly see all access rights to file servers, SharePoint, Exchange and vSphere in
one intuitive interface, including all Active Directory group memberships. This information empowers
you to act and prevent critical security breaches in your organisation.
8MAN gives you back control. One click on your resource view shows the current access rights
situation, including all employees and the rights they have been assigned.
DOCUMENTATION & REPORTING
8MAN creates reports that are truly needed. Auditors are impressed when you can show them any
employee’s access rights on one screen, with the click of a button. CEOs are relieved when they know
who exactly can access the “Employment Contracts” folder. Our reports are extremely intuitive, can be
easily configured with just a few clicks and can be automatically scheduled and sent to designated
people. The creation of a report requires only two simple steps: Defining which resource should be
analysed, and in which format it should be generated.
SECURITY MONITORING
Whether Active Directory or file server environments, your employees make changes more or less
constantly. Without comprehensive monitoring, organisational risk of sensitive data breaches
increases significantly.
Our 8MATEs AD Logga (for Active Directory) and FS Logga (for file servers) ensure that all security
related incidents are captured throughout your company network. This allows you to understand
and document what changes were made, which files were accessed and who accessed them.
Understanding patterns of behaviour and access across your network enables the optimisation
of processes and best practice guidelines, further reducing critical security risks.
ROLE & PROCESS OPTIMISATION
Data owners play a key role in 8MAN’s security philosophy. They are the ones that create and use data
day in, day out. Administrators, on the other hand, are often poorly equipped to understand which
documents contain sensitive information. By introducing role based concepts for the assignment and
analysis of permissions, you enhance security awareness across your organisation.
8MAN’s Data Owner concept breaks your company organisation down by department and assigns
responsibility for employees and resources to designated data owners, who actively grant and revoke
permissions. Our 8MATE GrantMa even allows you to setup additional workflows where your
employees can request permissions themselves. These requests are then approved or rejected by
the responsible data owner.
USER PROVISIONING
Role based templates allow you to setup new users within seconds and in line with standardised best
practice procedures. Setting up Email accounts simultaneously means no time is wasted during the
on-boarding process. All events can be scheduled and automatically revoked, ensuring that project
based permissions are only assigned temporarily. 8MAN allows Data Owners and help desk users to
play a meaningful part in the rights assignment process without requiring full administrative rights.
8MATEs Overview:
SECURITY
MONITORING
ROLE & PROCESS
OPTIMISATION
8MATE AD Logga
8MATE GrantMA
8MATE Alerts
8MATE FS Logga
INTEGRATION
PROGRAMMING
INTERFACES
8MATE for Exchange
8MATE for vSphere
8MATE for SharePoint
8MAN | Protected Networks GmbH
T: +44 020 7097 1602
E: [email protected]
W: www.8man.com
Distribution by:
8MATE Web API

Similar documents

8MAN Enterprise Brochure

8MAN Enterprise Brochure DOCUMENT MANAGEMENT / SHAREPOINT / CARD MANAGEMENT / ASSET MANAGEMENT / HELP DESK / SOFTWARE DELIVERY / IT COMPLIANCE / PCI-DSS & ISO.

More information

ss rights management data security m anagement

ss rights management data security m anagement decided to put our focus on the visualisation of access rights so that each company can get an understanding of its internal structure and complexity. This visualisation makes it easy for clients t...

More information

8MAN proof of concept - Oxford Computer Group

8MAN proof of concept - Oxford Computer Group Looking to the future, you can keep your AD healthy and secure, as well as control access to critical resources such as file servers, SharePoint, Exchange and VMware. Our health check significantly...

More information

8man version overview

8man version overview SECURITY MONITORING Active Directory Monitoring Tracks all Active Directory changes. All activity is captured in the 8MAN log book and/or generated as a report.

More information