OVERVIEW

Streamline Complex Access Rights Reviews

To meet compliance requirements and keep your files secure, it’s critical to make sure your file data is accessed only by those with a business need. User Rights Management for Files, included with the Imperva File Security products, lets you not only streamline access rights reviews but increase their accuracy too. It allows you to establish a repeatable process for reviewing file access rights and replace costly, error-prone manual processes with an efficient, automated workflow.

SPECIFICATIONS

User Rights Management for Files Specifications

SPECIFICATION DESCRIPTION
Operating Systems Supported
  • Windows 2003, 2008 and 2012
  • RedHat 5.X
  • Solaris 10
File Systems Supported
  • Windows file storage systems
  • UNIX/Linux file storage systems
  • NAS devices
Directory Services Supported
  • Microsoft Active Directory users and groups
User Rights Management
  • Audit user access rights to files via file system permissions
  • Validate excessive rights on sensitive data
  • Identify dormant accounts
  • Identify files accessible by global groups
  • Track changes to user rights
  • Revoke rights and group membership
  • Recommend data owners
Data Classification
  • Metadata and content-based via integration withData Loss Prevention (DLP) vendors such as RSA, Websense, McAfee, and Symantec
  • Manual designation
Management
  • Web User Interface (HTTP/HTTPS)
  • Command Line Interface (SSH/Console)
Administration
  • MX Server for centralized management
Events and Reporting
  • SNMP
  • Syslog
  • Integration with leading SIEM vendors
  • Email to data owners and other stakeholders
  • Custom followed action
  • SecureSphere task workflow
  • Integrated graphical reporting
  • Real-time dashboard
Related Products
  • File Activity Monitor
  • File Firewall
  • SecureSphere for SharePoint

Key Capabilities

 

ESTABLISH AN EFFICIENT, REPEATABLE PROCESS FOR ACCESS RIGHTS REVIEWS

Time is money. Comply with regulations and improve your security process by making it faster and easier to perform access rights reviews on an ongoing basis. SecureSphere provides an end-to-end workflow for reviewing permissions across all of your file storage systems, and even includes data owners in the process for increased accuracy and tighter control.


GIVE AUDITORS WHAT THEY WANT AND GET THE CONTROLS YOU NEED

You need to show auditors that only the right people are accessing your sensitive business data. With User Rights Management for Files, you can keep a detailed audit trail of permissions changes that’s clear and up to date. Prove your organization is in compliance with SecureSphere’s flexible reports that summarize the results of your permissions review.

ACTIVELY REDUCE YOUR RISK

You can prevent your file data from becoming an easy target. With SecureSphere, you can ensure that your files aren’t overly accessible by uncovering dormant users and unused access rights. Lower your risk of a data breach with our powerful analytics and reporting tools that make it easier to investigate and eliminate excessive permissions.


ALLOW DATA OWNERS TO CONTROL FILE ACCESS

You can reduce risk and keep files secure by directly involving data owners in access rights reviews. It makes sense—those who know the data best determine who can access it. With SecureSphere we’ve made it easy with an intuitive portal that allows business owners to log in, make file access decisions, and submit the results directly to IT to take action.