***hubspost stuff below

Let’s simplify Access Right Management

Information is like currency. As the way we do business is evolving, new threats to information surface. While there’s a lot of buzz about external risks data faces, are you doing enough to ensure the integrity of data internally?

Internal data security remains one of the weakest and arguably the most overlooked links in the life of an information asset.

Unstructured data, fragmented responsibilities, lack of overview and inaccurately defined permissions are the biggest perils facing businesses today. Sounds familiar?

8MAN can help.

Our state-of-the-art solution makes access rights management easy. With unique graphical user interface, it’s designed to save time, cut costs and ensure greater accountability in data-handling.

 

The Challenge

Today, a large majority of companies face the following situation:

 

The distinct lack of appropriate tools and resources, in conjunction with a continuously increasing flood of data, leaves your IT Administrator unable to offer a fast and simple overview of which users have access to which data.

This uncontrolled growth of access rights leaves your company’s critical data unprotected, leading to a security risk with real financial and business impacts.

Facts

  • 75% of the time administrators use for access rights management could be saved.
  • On average, there are 60% more access rights assigned than needed.
  • Up to 70% of data storage space is wasted on undesired and duplicated data. 

Confirmed by external studies

Due to the huge cost pressure that many IT departments face, available resources are severely constrained, which leads to even less time to manage basic processes such as access rights management. Despite this most companies pay insufficient attention to this very real security threat from within. While most companies are accutely aware of the threat posed from outside sources, and employ tools such as firewalls, virus and spyware scanners, as well as various encryption and obfuscation protocols to protect themselves from this threat, the danger of the wrong employees having access to internal information is often neglected. Independent analysis from i.e. IDC confirms that in 80-90% of the cases the threat comes from inside of the company.

 

Three examples

Apprentice/Intern effect

Usually, apprentices or interns are given various assignments in different departments, both to support the business as well as gain cross-functional experience within the company. In each department, they are assigned new access rights. The previous ones however are not revoked. As time passes, the apprentice has gained access rights to most of the directories in your network and is able to access company-critical data ranging from employment contracts and confidential HR information to sensitive financial data.

One possible solution is the administration of temporary access rights, which are revoked after a clearly defined period. This function is unique to 8MAN and allows you an easy and quick way to circumvent this problem.

 

Project effect

Working processes and relevant data are usually organised in dedicated project folders. Over time, employees change projects, new projects and folders need to be created and in many cases the administrators are not informed.

Ideally, the administrator needs to revoke access rights to closed projects quickly, and if employees move on to other projects, give access rights to the new project folders. If this is not managed effectively there is a real danger of access rights not being set correctly from the outset. This in turn leads to employees unable to access the information they require in order to contribute to their project assignments, causing unnecessary employee frustration. Valuable working time is lost threatening project timelines and deliverables which often leads to the assignment of excessive rights by the IT administrator under pressure from Project Sponsors and Managers. Again your business critical data is compromised by a lack of appropriate overview over how should be able to access what information.

A solution to this problem is the transfer of the ability to assign access rights to the Data Owners such as Project Managers and Heads of Departments.

 

Ever increasing volume of data

The habit of each employee collecting data, without also consolidating or cleaning up regularly, leads to a rapid increase in needed storage capacity. Another problem is duplication. Imagine the following example: A powerpoint presentation received by one employee is distributed to others. Many recipients will choose to store this presentation is duplicated in their own personal folders, despite it already being stored in a central location. With a presentation size of 5 Mbyte and a distribution to 200 employees this leads to a storage need of 1 Gbyte.

 

Joomla25 Appliance - Powered by TurnKey Linux