For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Identity Manager-Data Governance Edition

Data governance that puts you in control of sensitive data access

Identity Manager - Data Governance Edition is a data access governance tool that brings efficiency and optimal performance to your organization by transferring access control to the business owner from the IT staff. With the Identity Manager restricted-access functionality, you ensure secure access and define access policies with automated workflows. You have the power to analyze, approve and fulfill unstructured data access requests to files, folders and shares. This data governance software extends control to NTFS, NAS devices and SharePoint, thus ensuring that sensitive, unstructured data is only accessible to approved users.

Radboud University enhances security for over 40,000 users with One Identity Manager 04:05

Radboud University enhances security for over 40,000 users with One Identity Manager

Key Benefits

Protect and identify high-risk areas

Empower data owners to control access

Power to approve unstructured data-access requests

Detect and remediate policy violations

Automate request-and-approval workflow

Features

Cloud Governance

Govern the cloud and perform access reporting with support for Microsoft SharePoint Online and OneDrive.

Classification of Data

Classify governed data manually. Business owner can set classification in the web portal. This data governance software includes out-of-box policies and risk calculation based on the assignment of the classification level.

Restricted access

This data access governance tool ensures that your organization’s sensitive, unstructured data is only accessible to approved users by enabling you to define access policies; also locks down sensitive data such as files, folders and shares across NAS devices, NTFS and SharePoint.

Data owner assignment

Enables you to evaluate usage patterns and read and write access to help you determine and assign the appropriate owner of data for all future access requests.

Simplified auditing

Provides you with key information for audit preparations by allowing you to identify user access to enterprise resources such as files, folders and shares across NAS devices, NTFS, and SharePoint.

Automated access requests

Enables you to automatically direct access requests from the request portal to the appropriate data owner using built-in workflows, with no burden on your IT staff because approved requests are automatically and correctly fulfilled.

Access verification

This data governance software enables you to monitor user and resource activity, and configure and schedule a recertification process for data owners to verify and attest to employee access, thus ensuring that only approved users have access to specific resources.

Personalized dashboard

Unlike most data access governance tools, you can create a customized view of trends, historic and current data access activity, and attestation status on your personalized dashboard, and then allows you to generate compliance reports from that data.

Tour

New Share Process
Classification
Manage Cloud Host
Calculate Perceived Owner
New Share Request Approval
Assign Organizations
Account Comparison
Manage Access
New Share Process

New Share Process

Employees can submit their request for a new resource and managers are responsible for approving or denying the request for new resources. Now, see what else this data access governance tool can do for you.

Resources

Datasheet

Identity Manager Data Governance Edition

Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance
E-book

Top ten reasons to achieve Data Access Governance

It’s time to let a secure Data Governance strategy protect your sensitive data and reduce risk.
Technical Brief

Determining which Identity Manager product is best for your organization

The Identity Manager family of solutions enables you to choose the one that best meets your organization’s specific access management
White Paper

How to Achieve HIPAA Security Compliance with Identity Governance and Access Management

In this paper, you’ll learn about IT security compliance for the Health Insurance Portability and Accountability Act (HIPAA) from...
White Paper

Six Steps to Achieving Data Access Governance

Organizations know that controlling access to data is vital: security breaches, mistakes and leaks of sensitive enterprise data...
Case Study

Radboud University cuts enrollment time by 50 percent

University is able to quickly respond to changing laws and new technologies while ensuring that users have only the access they...
White Paper

The fundamentals How to surpass Payment Card Industry (PCI) data security standard (DSS) compliance...

In this paper, you’ll learn about IT security compliance for the Payment Card Industry Data Security Standard (PCI DSS) from an...
E-book

Security Starts Here - Identity Governance and Administration (IGA)

Security concerns and compliance make the need to manage access a top priority. The foundation for everything is identity governance...

Get started now

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.