User Rights Management for Files
Streamline Complex Access Rights Reviews
To meet compliance requirements and keep your files secure, it’s critical to make sure your file data is accessed only by those with a business need. User Rights Management for Files, included with the Imperva File Security products, lets you not only streamline access rights reviews but increase their accuracy too. It allows you to establish a repeatable process for reviewing file access rights and replace costly, error-prone manual processes with an efficient, automated workflow.
User Rights Management for Files Specifications
|Operating Systems Supported||
|File Systems Supported||
|Directory Services Supported||
|User Rights Management||
|Events and Reporting||
ESTABLISH AN EFFICIENT, REPEATABLE PROCESS FOR ACCESS RIGHTS REVIEWS
Time is money. Comply with regulations and improve your security process by making it faster and easier to perform access rights reviews on an ongoing basis. SecureSphere provides an end-to-end workflow for reviewing permissions across all of your file storage systems, and even includes data owners in the process for increased accuracy and tighter control.
GIVE AUDITORS WHAT THEY WANT AND GET THE CONTROLS YOU NEED
You need to show auditors that only the right people are accessing your sensitive business data. With User Rights Management for Files, you can keep a detailed audit trail of permissions changes that’s clear and up to date. Prove your organization is in compliance with SecureSphere’s flexible reports that summarize the results of your permissions review.
ACTIVELY REDUCE YOUR RISK
You can prevent your file data from becoming an easy target. With SecureSphere, you can ensure that your files aren’t overly accessible by uncovering dormant users and unused access rights. Lower your risk of a data breach with our powerful analytics and reporting tools that make it easier to investigate and eliminate excessive permissions.
ALLOW DATA OWNERS TO CONTROL FILE ACCESS
You can reduce risk and keep files secure by directly involving data owners in access rights reviews. It makes sense—those who know the data best determine who can access it. With SecureSphere we’ve made it easy with an intuitive portal that allows business owners to log in, make file access decisions, and submit the results directly to IT to take action.