}

Why Educational Organizations Need Automated Reporting

In all colleges and schools, data is kept on file servers throughout the network. Access to this data can often be messy and unstructured after years of granting and revoking access to different users. This unstructured data brings with it a level of risk in terms of adhering to compliance such as FERPA and NCES 97-859.

A risk that is often overlooked when assessing the need for access transparency is the reputation of the educational organization. Having spent 17 years working with the education industry and information security, we have seen many cases of private information such as student files or exam results getting into the wrong hands or users with extra access privileges. Regaining trust from students and staff after mishandling their private information is a tough feat and an easily avoidable one with the correct tools in place. With many colleges, schools and universities relying on an esteemed reputation for admissions, data breach is something you’ll want to avoid.

ERAM by Tools4ever, is a file system auditing software application that brings order to the chaos of unstructured data. This reporting tool makes all access permissions visible, maintaining a clear access trail. This access trail is key for auditing as it keeps track of all actions in the network. For example, when a user modifies a file, deletes it, copies it, moves it etc., there is a visual record of who carried out what action in the file system and when. With ERAM, you can obtain a bi-directional view of groups and their memberships as well as a user’s group memberships.

ERAM has some great spin off benefits for management. It goes as far as to make recommendations about how to structure and unstructured data logically. It can highlight users who have access they may not be using which can in some cases save organizations money as they can revoke obsolete licenses and/or accounts.

The user friendly and customizable dashboard offers an overview of all access rights from the perspective of file to user (how many users can access a certain file and what level of access do they have) or user to file (how many files can a user access and what level of access do they have to each file). You can also view access on a group level, which can be very useful for students enrolled in certain courses/modules that would require certain additional access.

Protection of data and information has become an unavoidable obstacle for educational organizations in the past few years. Be pro-active and put in place a cost effective automated reporting tool to shine a light on access. ERAM is key to keeping your school, college or university structured, secure and compliant.

Course folder management- an astonishing commonly unknown feature of an iam solution

There is a lot of functionality which makes up an IAM solution but course folder management is functionality which continues to astonish system admins. When obtaining an identity management product, one would not expect the ability to manage the full lifecycle of student course folders, but this is a feature which has proven to be extremely beneficial. Interestingly enough, requests for this type of functionality have become common, as more and more schools have begun looking for additional functionality from their automated account management solution.

Read more

Category

Education

Course Folder Management, Folder Management, IAM, PowerSchool, Student Account Management, student information system, Tools4ever, UMRA

Distribution list management simplified

As a system administrator, managing a large number of distribution lists can be a tedious task. Parsing through email requests and support tickets for adding and/or removing distribution list members, with the occasional approval required from upper management, can easily result in a full day of work!

Read more

Access Request Forms – Simplified with Automation

When a new employee joins an organization, providing the appropriate network access for their new role can be a tedious task. Many organizations use a printed document which is manually completed by the hiring manager, detailing the new employees’ role and network access requirements. This process can take a great deal of time, leaving the new employee idle not able to begin work.

Read more

Category

Education

access form, New Employee, Workflow Management, access, data breach

How to Ensure Against Duplicate User Accounts In Your Network

When integrating an Identity & Access Management automated routine with a human resource system, locating a unique identifier to be used across each system is key. Typically, the employee ID is optimal as it unique to each employee. Within many industries, it is common for an employee to work at various sites.

Read more

Category

Education

Duplicate Accounts, employee ID, unique identifier, user provisioning

Connecting Office 365 to Identity Access Management Solutions

Microsoft Cloud is revolutionizing the way organizations across various industries operate; providing various services at a minimal cost and scalability that fits the needs of any organization. Microsoft’s productivity service Office 365 has opened the doors for employees and students, allowing them easy access of these tools on the go. Whether you are in the office, at home, or on the road connectivity can be simple and secure.

Read more

Category

Education

single sign on, connectivity, password, access, security, sso, 2fa, mfa, access management, remote employees