User file permission management



Simplify complex access audit

To meet compliance requirements and ensure file security, you must ensure that file data is accessed only by those with business requirements. With the help of file user rights management functions provided in Imperva file security products, access rights auditing can not only be simplified, but also accuracy can be improved. Through this function, a repeatable process can be established to perform file access audit, replacing costly and error-prone manual processes with efficient automated workflows.



Create an efficient and repeatable process to perform access audit

time is money. By faster and easier execution of daily access rights audits, regulatory requirements can be met while security processes can be improved. SecureSphere provide an end-to-end workflow to perform permission audits across all file storage systems, and even include data owners in this process, helping to improve accuracy and strengthen control.

provide the auditor with everything he needs and give you the control you need.

you need to prove to the auditor that only appropriate personnel can access your sensitive business data. Through the file user rights management function, a detailed, clear and up-to-date audit trail can be maintained for permission changes. SecureSphere provide flexible reports to summarize your permissions audit results to prove that your organization is in compliance.

actively reduce risks

You can prevent your file data from becoming vulnerable targets. With SecureSphere, you can find dormant users and unused access rights to ensure that your files are not overstepped. Through our powerful analysis and reporting tools, it is easier to investigate and eliminate ultra vires, thereby reducing the risk of data leakage.

allows data owners to control file access

helps reduce risks and ensure file security by directly including data owners in access audit. It is also reasonable that the person who knows the data best decides who has access to the data. Through the intuitive portal provided by SecureSphere, business owners can easily log in, make file access decisions, and submit the results directly to IT for action.

Specifications


User file permission management specifications

SpecificationsDescription
supported operating systems
  • Windows 2003, 2008 and 2012

  • RedHat 5.X

  • Solaris 10

supported file systems
  • Windows file storage system

  • UNIXLinux file storage system

  • NAS devices

Supported directory services
  • Microsoft Active Directory users and groups

User permission management
  • You can use the permission to audit the user's access to the file.

  • Verify that sensitive data is used in an unauthorized way.

  • Identify hibernation accounts

  • Identify files that can be accessed by global groups

  • Track user permission changes

  • Revoke permissions and group membership

  • The recommended data owner

Data classification
management
  • Web user interface (HTTP/HTTPS)

  • The command line interface (SSH/console)

management
  • > Implement centralized management through MX Server

events and reports
  • SNMP

  • Syslog

  • and LeadingSIEM supplierSIEM supplier

  • email data owners and other stakeholders

  • Conformed operations

  • SecureSphere task workflow

  • Integrated Graphics Report

  • Real-time dashboard

related products