8MAN proof of concept - Oxford Computer Group
Transcription
8MAN proof of concept - Oxford Computer Group
SERVICES & SOLUTIONS 8MAN proof of concept Understand who has access to what in your AD A carefully planned Identity and Access Governance (IAG) solution will give a clear view of the current state of permissions and access. Once you know this you can define the desired state – what permissions users should have – and go about achieving a managed state where you are in control and policy violations are flagged before they occur. Introduction Who has access to what information in your organization? Is the access they have to your systems appropriate? If asked could you run an accurate report on it? It’s a problem many organisations face and is fast becoming a priority for information security staff. That’s because organizations now have to comply with an increasing list of regulations – SOX, PCI DSS, Basel II, Solvency II, and ISO 27001. Organizations need to guard the financial risk of fraud, identity theft, unauthorised access to Intellectual Property and protecting the company’s brand image. How we can help An Active Directory health check will analyse in depth your AD to discover any security breaches within it. We will work with you to review and interrogate data from your AD. We’ll help you to understand who currently has access to what and identify any possible risks. We’ll make recommendations to solve any problems we uncover and help you define processes to significantly reduce risks. To do this we use 8MAN, a tool which looks in depth at security across your network, gives live interactive analysis of your AD and file server environments, and creates reports, giving you facts to act on. Results If you engage us for your AD health check you’ll get: ■■ Overall scorecard (A-F) ■■ Reports on top 3 users, top 3 directories “In Active Directory there is no way of knowing who has done what. But with 8MAN we’ve been able to enforce a high level of transparency to answer such questions with ease. Especially for compliance purposes 8MAN is ideal. It is now possible for us to trace the cause of unauthorized access or security incident.” - Alban Anokuru, Service Delivery Manager, IPES T +44 8456 584425 +44 8456 584426 E [email protected] W www.oxfordcomputergroup.co.uk F ■■ Reports which show who is accessing what ■■ Highlighting the top 3 security priorities (i.e. recursions, direct authorisations, everyone access, Kerberos token etc.) ■■ Proposals for clean-up activities ■■ An 8MAN dashboard which shows top users, last logon, everyone access, unresolved SIDs and more SERVICES & SOLUTIONS 8MAN proof of concept Understand who has access to what in your AD Benefits This health check will reveal areas of business risk and produce reports, such as: ■■ Who has access to a directory? ■■ What directories does a user have access to? The 8MAN Dashboard (screenshots pictured right) will show top users, last logon, everyone access, unresolved SIDs and so on. Armed with this information you will be able to revoke inappropriate access and minimise business risk. What next? Looking to the future, you can keep your AD healthy and secure, as well as control access to critical resources such as file servers, SharePoint, Exchange and VMware. Our health check significantly improves the implementation of a robust identity management platform, which will help automate security and access and save you hours in manual detection. Let OCG help you achieve this. A carefully planned Identity and Access Governance (IAG) solution will give a clear view of the current state of permissions and access. Once you know this you can define the desired state – what permissions users should have – and go about achieving a managed state where you are in control and policy violations are flagged before they occur. Once you know the current state of your Active Directory you may want to consider its appropriateness for your current and future needs. So the next step from the health check could be a directory service design review (Windows Server or AD workshop) to look at how your directory services are structured and could be structured to support the demands of people, devices and services wherever they may be. If the design and current state is based on aging versions of Windows Server, and on premise demands, change could bring significant benefits. For more information on OCG’s IAG solutions and Identity and Security services, contact us today. Oxford Computer Group creates identity and service automation solutions using Microsoft technology. We automate IT processes so people get timely and appropriate access to the applications and services they need, making them more effective, saving time and money. Since 2002, we have completed more than 600 enterprise projects and trained more than 6,000 IT professionals in Europe and North America. We are run by the same down-to-earth and approachable people who founded the company in 1983. Copyright © Oxford Computer Group 2013 T +44 8456 584425 +44 8456 584426 E [email protected] W www.oxfordcomputergroup.co.uk F
Similar documents
access rights management with 8man
documents contain sensitive information. By introducing role based concepts for the assignment and analysis of permissions, you enhance security awareness across your organisation. 8MAN’s Data Owne...
More informationss rights management data security m anagement
to manage access rights for Windows environments. 8MAN is the result of a real business need being brought to us by our customers. We stay close to our customers, hence we constantly reassess the c...
More information8MAN Enterprise Brochure
8MAN integrates various technologies to give you a quick and easy overview of permissions, making your day-to-day tasks easier. It improves internal security by offering an overview of rights on fi...
More information