Insight Into Unstructured Data

Understanding who has access and should have access

Enterprise Resource Authorization Manager provides clear insight into unstructured data

ERAM -Enterprise Resource Authorization ManagerAn increasing amount of data is stored by employees in an unstructured format both inside and outside of the network. According to estimations by Gartner, over 80% of business information is stored as unstructured data. This drastically increases the complexity of access management. Without the correct software solutions it is impossible to guarantee that this data is effectively protected.

ERAM enables organizations to streamline and optimize access control for unstructured data. The solution clearly shows who has access, who should have access, who owns the data, who has tried to access certain data and where sensitive information has been stored. This will allow you to define what the access should look like, so that ERAM can ensure it is set up correctly.

Features

  • Direct insight into all the access privileges relevant to the file system through the rights structure in Active Directory groups, ACLS and direct access.
  • A detailed audit trail of the actions (edit, remove, create, move, etc.) that each employee has performed for what file and which directory, and at what time.
  • Recommendations with regards to the set of rights that can be reduced based on the actual activities performed by an employee.
  • The ability to determine which employee owns (a particular subset) of the data.
  • A controlled way of requesting and receiving access through the owner of the data.
Collection

Collection

The Collection module uses ERAM agents to collect all access rights from the various sources and saves these in a normalized format in a centralized database. The Collection module collects the data using various different snapshots and is able to collect all data in one go, but is also capable of continuously monitoring which changes occur and register these.

Benefits of ERAM

Beter inzicht

Better insights

Enhanced insight into the actual access privileges for the file system. The ability to provide insight into access privilege pollution in the file system, to clean it up and to prevent future pollution.

Compliant

Compliant

The ability to be compliant and meet the audit requirements ensures the organization does not run any risks. This safeguards the business operations and prevents sensitive business information ending up in the wrong hands.

Eindgebruiker

End user

End users know what they can expect. They do not have superfluous access privileges, and any required additional privileges can be requested quickly and easily.

Reporting

Reporting

The reporting module offers a broad range of predefined reports, including the access to a file/directory through more than one group membership, groups and user accounts that no longer exist in Active Directory and duplicate access privileges for the file/folder of a user or group. It is also possible to define custom reports.

Benefits of reporting

Security manager

Security manager

Gain control over the access to unstructured data through advanced reporting and an interactive dashboard.

Interactive

Interactive

ERAM’s interactive module makes it possible to browse all access privileges through a single tree view. This provides direct insight into the resources to which employees have access (People to Files), who has access to a particular resource (Files to People) and which actions have been performed on the resources by whom.

Monitoring

Monitoring

ERAM is able to keep track of each action performed on unstructured data and intervene where necessary. Through proactive monitoring, triggers can be set for data and persons that require an action when a particular event takes place. Reactive monitoring offers the possibility to answer questions based on previous actions.