From IST to the SOLL with

File servers and AD consolidate for consistent data, access rights, and processes

In our webinar series, we will show you step by step how you can come up with state-of-the-art clean access to best practices with us and our products, and preserve this permanently with process-oriented, resource-friendly authorization management. The 4 webinars took place between January and March 2018 and are now available here.

  • Step 1 / 4 - the authorization workshop
    Making company data efficient and secure at the same time is a demanding goal. Misconfigurations in folder and permission trees are too easy if administration and cleanup processes are missing. In many companies, sound statements about the condition of these structures are not possible at all, because transparency and appropriate tools are lacking.
    In the first part of our webinar series, we show you how to take the first step with our authorization workshop to recognize these problems and to establish lasting solutions.
  • Step 2 / 4 - data, folder and rights analysis with
    In times of big data and seemingly unlimited disk space, file service cleanup concepts are becoming a rarity - but data is much more than just disk space on the server. First and foremost, your company's data is a valuable work tool for your employees and a company value that should not be underestimated.
    In the second part of the webinar series, we show you which reports and statistics migRaven helps you to understand the data and rights structures of file servers and Active Directory. The knowledge acquired in this way forms the basis for significantly increasing both security and efficiency in dealing with company data. Because only those who know the IS can design a SOLL that solves the actual problems.
  • Step 3 / 4 - Convert target structure with
    In this webinar, we will show you how to implement the structures that have been developed beforehand, while at the same time data can be cleared up. For this purpose, the adjustments are first simulated with the help of the software in the supplied database and tested there. Finally, the transmission of the desired state to the target system takes place. offers you various procedures in the context of different project types.
  • Step 4 / 4 - tenfold Create and connect rights management
    With tenfold, you can effortlessly maintain the consistency of your new file server and AD structures. A special role is played by the web interface and an automated workflow system. This allows users and departments to independently request access rights and have them approved by the assigned data owner. In addition, many systems such as Exchange, Sharepoint, SAP, HR, CRM and ERP can be connected. This relieves the burden on IT and establishes company-wide processes for long-term consistent user, data and legal structures.

Download tip: the in the clear flyer