Netwrix Monitoring and tenfold IAM
Advantages and synergy
Entitlement management means a significant improvement in enterprise data security and ensures adherence to corporate policies and compliance with privacy rules. But also authorization management can not prevent a user from improperly using his rights or access by third parties without authorization.
With Netwrix Auditor for AD and Auditor for file server We therefore carry out a meaningful Supplement to authorization management in our portfolio, which on the one hand can detect possible threats due to unusual activities and on the other hand provides you with revision-proof documentation of all processes in the Active Directory and on the file server.
We offer you an individual package including added value if you use Netwrix and tenfold. Both solutions are implemented in the free installation service by one of our trained aikux.com specialists and coordinated. Within a short time, all important functions are available to ensure compliance for your user and rights management.
We are happy to work for you Your individual benefit package. Contact us!
Overview: Immediately available functions
- Permanent control authority for the assignment of authorizations
- IT risk assessment reports show risk levels related to AD, file server, user, computer and data
- Logon activity reports show, for example, the accounts with the most logins or failed login attempts
- Advanced Auditing allows you to audit your AD at the Object level including all subcategories
- For example, state in time reports for Active Directory show the effective group memberships of user accounts
- State in time reports for file servers show, for example, duplicate files, larger than average files and various directory access reports
- complete documentation of file server permissions with clear reports
- revolutionary easy authorization management for administrators and data owners
- Complete user lifecycle management from entry through to any changes until the employee leaves the company
- Self-Service Portal lets employees request and approve access rights to relieve IT
- Permanently consistent authorization group structures according to Microsoft Best Practice
Overview: Additional bookable services
- Installation of further modules (Exchange, SharePoint, SQL, VMWare, Netapp, EMC, O365, etc)
- Create individual alerts for behavioral anomalies
- Establishment of authorization workflows according to BPMN standard under the guidance of an expert
- Configuration of plugins for the connection of other important systems (HR, SAP, Sharepoint, etc.)
- Configure profiles for departments and locations to automate basic permissions based on user data
What can we do for you?
From IST to the SOLL made easy
Download here
As a specialized IT service provider, we bring transparency and order to your authorizations and help you to reuse your data. We accompany you in the project, train your employees and use innovative software.
- authorization workshop for the analysis of file servers and AD - with concrete solution proposals and documentation
- Preliminary Migration / restructuring data and legal structures for a clean start
- Implementation of Data Retention to outsource up to 70% of all data and significantly increase user efficiency