Category Archives: Data Access Governance

IAM, DAG, PAM: How to break the silos of security tools

IAM; PAM, DAG for Identities

Identity Access Management, PAM, DAG

Between 2009 and 2014, the number of successful attacks on information security increased at an average annual rate of 66%. Bearing in mind that insiders are responsible for two thirds of these attacks, managing users’ access rights with Identity Access Management has become a critical issue taken very seriously by senior management.

A large number of security solutions are now available, offering different value propositions. Identity Access Management (IAM), data access governance (DAG) and privileged account management (PAM) solutions each make their contribution at different levels to controlling access rights. As the common denominator, the user’s identity can be used to de-compartmentalize these solutions, culminating in an integrated security concept. In the following I will describe a framework for using these products based on user identity, and outlines an integrated architecture meeting IT security requirements over the long term.

Tags: |
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.

Data Access Governance for unstructured data

Improve your security and reduce the risk of data theft

Beta Systems Software AG introduces the GARANCY Data Access Governance (DAG) solution. This enables customers the secure administration and control of access rights to data stored in unstructured format. Access to data resources can be managed at sub-AD group level such as on file servers, in Microsoft SharePoint or other document management systems. Company data is thus far better protected. GARANCY DAG helps organizations meet the high expectations in risk management and increasing compliance demands in regard to critical information.

Data Access Governance

Data Access Governance

Growing security risks are often neglected

Companies have to process ever greater volumes of unstructured data – such as documents, spreadsheets, presentations or e-mails – on a daily basis. This leads to non-transparent file systems, unmanageable access authorizations and higher security risks. Security is threatened by undesired rights accumulations, multiple used accounts and orphaned user rights of former employees. Companies need clarity on who may access what data, who controls data access and whether the file system has structural weaknesses that facilitate unwanted data leakage.

Tags:
Thomas gr. Osterhues
Thomas is Senior Manager Marketing at Beta Systems. While working at market leaders Coca-Cola and Lidl, he was infected with the tech bug and moved rapidly into the software world, working for leading ECM and IAM companies in Marketing, Channel Sales and Product & Solution Management., with a strong focus on business processes and identity access management challenges at large clients. He is able to rapidly understand and articulate how technology can solve specific business challenges: for sectors, channels, prospects, teams ... and bring all stakeholders on board. He is someone who gets the job done – and then some.