8MAN proof of concept - Oxford Computer Group

Transcription

8MAN proof of concept - Oxford Computer Group
SERVICES & SOLUTIONS
8MAN proof of concept
Understand who has access to what in your AD
A carefully planned Identity and Access
Governance (IAG) solution will give a clear
view of the current state of permissions and
access. Once you know this you can define
the desired state – what permissions users
should have – and go about achieving a
managed state where you are in control and
policy violations are flagged before they
occur.
Introduction
Who has access to what information in your organization? Is the
access they have to your systems appropriate? If asked could
you run an accurate report on it?
It’s a problem many organisations face and is fast becoming
a priority for information security staff. That’s because
organizations now have to comply with an increasing list of
regulations – SOX, PCI DSS, Basel II, Solvency II, and ISO 27001.
Organizations need to guard the financial risk of fraud, identity
theft, unauthorised access to Intellectual Property and protecting
the company’s brand image.
How we can help
An Active Directory health check will analyse in depth your AD
to discover any security breaches within it.
We will work with you to review and interrogate data from
your AD. We’ll help you to understand who currently has
access to what and identify any possible risks. We’ll make
recommendations to solve any problems we uncover and help
you define processes to significantly reduce risks.
To do this we use 8MAN, a tool which looks in depth at security
across your network, gives live interactive analysis of your AD
and file server environments, and creates reports, giving you
facts to act on.
Results
If you engage us for your AD health check you’ll get:
■■ Overall scorecard (A-F)
■■ Reports on top 3 users, top 3 directories
“In Active Directory there is no way of
knowing who has done what. But with 8MAN
we’ve been able to enforce a high level of
transparency to answer such questions with
ease. Especially for compliance purposes
8MAN is ideal. It is now possible for us to
trace the cause of unauthorized access
or security incident.” - Alban Anokuru,
Service Delivery Manager, IPES
T
+44 8456 584425
+44 8456 584426
E [email protected]
W www.oxfordcomputergroup.co.uk
F
■■ Reports which show who is accessing what
■■ Highlighting the top 3 security priorities (i.e. recursions, direct
authorisations, everyone access, Kerberos token etc.)
■■ Proposals for clean-up activities
■■ An 8MAN dashboard which shows top users, last logon,
everyone access, unresolved SIDs and more
SERVICES & SOLUTIONS
8MAN proof of concept
Understand who has access to what in your AD
Benefits
This health check will reveal areas of business risk and produce
reports, such as:
■■ Who has access to a directory?
■■ What directories does a user have access to?
The 8MAN Dashboard (screenshots pictured right) will show
top users, last logon, everyone access, unresolved SIDs and
so on. Armed with this information you will be able to revoke
inappropriate access and minimise business risk.
What next?
Looking to the future, you can keep your AD healthy and
secure, as well as control access to critical resources such as file
servers, SharePoint, Exchange and VMware. Our health check
significantly improves the implementation of a robust identity
management platform, which will help automate security and
access and save you hours in manual detection. Let OCG help
you achieve this.
A carefully planned Identity and Access Governance (IAG)
solution will give a clear view of the current state of permissions
and access. Once you know this you can define the desired state
– what permissions users should have – and go about achieving
a managed state where you are in control and policy violations
are flagged before they occur.
Once you know the current state of your Active Directory you
may want to consider its appropriateness for your current and
future needs.
So the next step from the health check could be a directory
service design review (Windows Server or AD workshop) to
look at how your directory services are structured and could
be structured to support the demands of people, devices and
services wherever they may be.
If the design and current state is based on aging versions of
Windows Server, and on premise demands, change could bring
significant benefits.
For more information on OCG’s IAG solutions and Identity and
Security services, contact us today.
Oxford Computer Group creates identity and service automation solutions using Microsoft technology. We automate IT processes so people get
timely and appropriate access to the applications and services they need, making them more effective, saving time and money. Since 2002, we have
completed more than 600 enterprise projects and trained more than 6,000 IT professionals in Europe and North America. We are run by the same
down-to-earth and approachable people who founded the company in 1983.
Copyright © Oxford Computer Group 2013
T
+44 8456 584425
+44 8456 584426
E [email protected]
W www.oxfordcomputergroup.co.uk
F

Similar documents

access rights management with 8man

access rights management with 8man documents contain sensitive information. By introducing role based concepts for the assignment and analysis of permissions, you enhance security awareness across your organisation. 8MAN’s Data Owne...

More information

ss rights management data security m anagement

ss rights management data security m anagement to manage access rights for Windows environments. 8MAN is the result of a real business need being brought to us by our customers. We stay close to our customers, hence we constantly reassess the c...

More information

8MAN Enterprise Brochure

8MAN Enterprise Brochure 8MAN integrates various technologies to give you a quick and easy overview of permissions, making your day-to-day tasks easier. It improves internal security by offering an overview of rights on fi...

More information