For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Identity Manager - Data Governance Edition

Data governance that puts you in control of unstructured sensitive data

Identity Manager Data Governance Edition secures and enables your organization by putting a data access governance tool into hands of the business owner rather than the IT staff. Identity Manager Data Governance Edition provides a self-service portal to manage access to data using an approval, attestation and fulfillment engine, and enables the business owner to grant access to sensitive data.  The power to analyze, approve and fulfill unstructured data access requests is granted to files, folders and shares across NTFS, NAS devices and SharePoint. Identity Manager Data Governance Edition ensures that sensitive, unstructured data is only accessible to approved users, increases security and reduces the burden on IT staff.


Identity Manager - Data Governance Edition

Key Benefits

Protect and identify high-risk areas

Empower data owners to control access

Power to approve unstructured data-access requests

Detect and remediate policy violations

Automate request-and-approval workflow

Analyze unstructured data access requests to files, folders, NAS and SharePoint


Cloud Governance

Govern the cloud and perform access reporting with support for Microsoft SharePoint Online and OneDrive.

Classification of Data

Classify governed data manually. Business owner can set classification in the web portal. This data governance software includes out-of-box policies and risk calculation based on the assignment of the classification level.

Restricted access

This data access governance tool ensures that your organization’s sensitive, unstructured data is only accessible to approved users by enabling you to define access policies; also locks down sensitive data such as files, folders and shares across NAS devices, NTFS and SharePoint.

Data owner assignment

Enables you to evaluate usage patterns and read and write access to help you determine and assign the appropriate owner of data for all future access requests.

Simplified auditing

Provides you with key information for audit preparations by allowing you to identify user access to enterprise resources such as files, folders and shares across NAS devices, NTFS, and SharePoint.

Automated access requests

Enables you to automatically direct access requests from the request portal to the appropriate data owner using built-in workflows, with no burden on your IT staff because approved requests are automatically and correctly fulfilled.

Access verification

This data governance software enables you to monitor user and resource activity, and configure and schedule a recertification process for data owners to verify and attest to employee access, thus ensuring that only approved users have access to specific resources.

Personalized dashboard

Unlike most data access governance tools, you can create a customized view of trends, historic and current data access activity, and attestation status on your personalized dashboard, and then allows you to generate compliance reports from that data.


New Share Process
Manage Cloud Host
Calculate Perceived Owner
New Share Request Approval
Assign Organizations
Account Comparison
Manage Access
New Share Process

New Share Process

Employees can submit their request for a new resource and managers are responsible for approving or denying the request for new resources. Now, see what else this data access governance tool can do for you.



Identity Manager Data Governance Edition

Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance

Top ten reasons to achieve Data Access Governance

It’s time to let a secure Data Governance strategy protect your sensitive data and reduce risk.
Technical Brief

Determining which Identity Manager product is best for your organization

The Identity Manager family of solutions enables you to choose the one that best meets your organization’s specific access mana...
White Paper

How to Achieve HIPAA Security Compliance with Identity Governance and Access Management

In this paper, you’ll learn about IT security compliance for the Health Insurance Portability and Accountability Act (HIPAA) fr...
White Paper

Six Steps to Achieving Data Access Governance

Organizations know that controlling access to data is vital: security breaches, mistakes and leaks of sensitive enterprise data...
Case Study

Radboud University cuts enrollment time by 50 percent

University is able to quickly respond to changing laws and new technologies while ensuring that users have only the access they...
White Paper

The fundamentals How to surpass Payment Card Industry (PCI) data security standard (DSS) complia...

In this paper, you’ll learn about IT security compliance for the Payment Card Industry Data Security Standard (PCI DSS) from an...
White Paper

A Guide for Identity Governance and Administration Programs

How to implement an IGA program from beginning to end

Get started now

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.