Navigation

  • Home
  • Company
    • Who are we?
    • News & Events
    • References
    • Jobs
  • Offers
    • IP Address Management
    • IT Security Management
    • IT Service Management
    • IT Infrastructure Management
  • Partners
  • Services
    • Consultation and Implementation
    • Performance Care Service
    • Maintenance and Support
    • Managed Security Services
  • Contact
  • Cookie-Richtlinie (EU)
  • Datenschutzerklärung (EU)
  • Impressum

info@genesis.swiss    |   +41 31 560 35 35

genesis.swiss
genesis.swiss
  • Home
  • Company
    • Who are we?
    • News & Events
    • References
    • Jobs
  • Offers
    • IP Address Management
    • IT Security Management
    • IT Service Management
    • IT Infrastructure Management
  • Partners
  • Services
    • Consultation and Implementation
    • Performance Care Service
    • Maintenance and Support
    • Managed Security Services
  • Contact
  • Cookie-Richtlinie (EU)
  • Datenschutzerklärung (EU)
  • Impressum

8MAN

Access Rights Management

8MAN is the leading solution for Access Rights Management (ARM) in Microsoft and virtual server environments (AD). It protects the business from unauthorised access to sensitive data. The software solution developed in Germany by Protected Networks sets the benchmark for professional network security and agile IT organisation. It bundles state-of-the-art functionality with the fulfilment of current security and compliance guidelines. The core functions of 8MAN include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimisation and User Provisioning

Solution for Access Rights Management with 8MAN

  • Intelligent full-text search
  • Historical data
  • Delegation
  • Web-based approval process
  • Multi-user operation
  • For locations distributed around the world

PERMISSION ANALYSIS

If you cannot see the danger, it is hard to fight it. 8MAN analyses the authorisation situation in your business and shows you who can access which resources. From a central viewpoint, you can see the group memberships from the Active Directory and the access rights for your file server, SharePoint Sites, Exchange, Office 365 or any other SQL Database. Now that you have this information you will know what to do and be able to protect your company from internal breaches of security.
8MAN gives the control back to you. Just one click on the resources view and you can see the current status of a scanned system and the employees who are authorised to be there.

DOCUMENTATION & REPORTING

8MAN creates reports that are vital. Auditors are astounded when they see the access rights of an employee. Managers are relieved to know who has access to the personnel data folder. The reports can be configured with just a few clicks, so everyone can understand them and they can be sent out automatically. A report is drawn up in two steps: Defining the resources to be analysed and selecting the output format.

SECURITY MONITORING

A whole number of employees make changes in the Active Directory as well as on the file server. Without a fully comprehensive monitoring system there will inevitably be risks to the security. With the 8MATE AD Logga (for the Active Directory) and the 8MATE FS Logga (for file servers), you can record all the security-related activities in your company’s network. This will help you to understand who has done what in the network and to clarify the causes in the event of problems. At the process level, you will gain complete transparency of the Access Rights activities. Even changes made outside of 8MAN are recorded. You can optimise your Access Rights Management process on the basis of the information you have gained.

ROLE & PROCESS OPTIMIZATION

It is not just the administrator who knows best regarding who should have access to what, but also the respective data owner and the supervisor. By introducing a role concept for analysing and granting access rights, you are contributing to increased data awareness and the appropriate action in your company. More specifically, you are creating an organisational chart of your company and including all the departments. Next you will show the individual data owners to your employees. The data owners analyse or assign the access rights of your employees to the resources. With the 8MATE GrantMA add-on module, the employee can order new authorisation via a web portal. The data owner then decides whether to approve the request in a user-defined workflow.

USER PROVISIONING

Create new users in a matter of seconds with role-based templates. The process for generating users is standardised and designed according to the roles in your company. The group access rights defined in the Active Directory for the file server, SharePoint Sites, Exchange and virtual servers are assigned at the same time.

So that the new employee can get started right away, 8MAN generates the corresponding e-mail account. Schedule the activation to prepare for an entry in the future or to limit time involved in project work. Whether it is the Helpdesk or data owner: In both cases, those involved work with a reduced, simple interface. All accesses are set up in just a few steps.

Factsheet Download

Any questions? Do you wish a personal consultation?

Contact us

Any questions? Do you wish a personal consultation?

Contact us
Previous Portfolio
Cyberark
Next Portfolio
VitalQIP Nokia

Contact

Tel +41 31 560 35 35
Fax +41 31 560 35 45
info@genesis.swiss

Hotlinks

Jobs
Who are we?
News

Legality

Legal Notice
General Terms and Conditions

  • Twitter
  • Xing
  • Linkedin

News

Copyright 2021 GENESIS Swiss Team AG

Loading...
Cookie-Zustimmung verwalten
Um dir ein optimales Erlebnis zu bieten, verwenden wir Technologien wie Cookies, um Geräteinformationen zu speichern und/oder darauf zuzugreifen. Wenn du diesen Technologien zustimmst, können wir Daten wie das Surfverhalten oder eindeutige IDs auf dieser Website verarbeiten. Wenn du deine Zustimmung nicht erteilst oder zurückziehst, können bestimmte Merkmale und Funktionen beeinträchtigt werden.
Funktional Always active
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt. Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Einstellungen ansehen
{title} {title} {title}