SlideShare a Scribd company logo
Access Rights Management. Only much Smarter.
ACCESS
GOVERNANCE
Access Rights Management. Only much Smarter.
ACCESS GOVERNANCE:
MADE EASY WITH 8MAN
Access Rights Management. Only much Smarter.
ACCESS GOVERNANCE: MADE EASY WITH 8MAN
Clarity with just one click
8MAN technology scans and displays the access rights structure within an organization
clearly. This makes the administration of access rights simple and straightforward. 8MAN
saves time and reduces costs while also closing dangerous security gaps in data and user
management.
Discover a completely new way of managing roles and delegating responsibilities. Our
unique Data Owner concept enables you to give business users (for example department
heads) the power to manage access to their data without requiring other
administrative rights.
Security Transparency Efficiency Accountability
Visualize access rights
Identify and administrate
incorrect access rights.
Minimize risk
Protect sensitive data by
limiting access to a
need-to-know basis.
Enable compliance
Use 8MAN as a foun-
dation for compliance
and legal requirements
(ISO 27001, PCI DSS,
SOX).
Track changes
8MAN requires all
changes to be
commented and logged.
Administrate efficiently
Simple reporting and
administration saves time
and costs.
Simplify access rights
Assign access rights
flexibly via role-based
templates or even limit
them temporarily.
Automate reporting
Communicate actual
access rights to affected
parties.
Incorporate Data
Owners
Delegate responsibilities
and processes to help-
desk and individual
departments.
8MAN for
SharePoint
8MAN for
Exchange
8MAN for
vSphere
8MAN for
SAP
Diverse Technologies. Single Interface.
8MAN is a single platform from which any organization can manage access rights across
multiple technologies. With 8MAN and its expansions, the process of access rights
management is streamlined across an entire organization.
In addition to the standard Active Directory and file server capabilities, 8MAN offers
individual expansions for SharePoint, Exchange, vSphere and SAP.
Contact
Steven Gormly
Account Manager
steveng@8man.com
+49 30 390 63 45-22
www.8man.com
1 Stanhope Gate
Camberley
Surrey
GU15 3DW
© Protected Networks GmbH 2014, All rights reserved.
Identify discrepancies
Keep access to your organization’s critical
data secure. With 8MAN, the visualization
of access points across IT environments
quickly identifies errors and discrepancies.
Enable Data Owners
With 8MAN’s Data Owner features you can
delegate responsibilities to department
heads and project managers. Enabling
Data Owners improves the quality of access
rights decisions while also reducing the
extra workload on your IT administrators.
Generate quick reports
Our comprehensive reporting suite allows
administrators, managers and department
heads to easily understand the existing
access rights structure.
Improve compliance
8MAN simplifies strenuous tasks like
certification of legal and regulatory
compliance standards such as PCI DSS, ISO
27001 and SOX.
Support IdM implementation
8MAN provides invaluable support in
IdM projects - delivering dependable and
accurate information regarding the actual
access rights situation. 8MAN allows you to
create target/actual comparisons for more
efficient IdM implementation.
Efficiency, security and compliance from a single source

More Related Content

What's hot

AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaS
Jane Jones
 
Rsa archer training
Rsa archer trainingRsa archer training
Rsa archer training
Global Online Trainings
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
Snow Software ITAM Review Tools Day
Snow Software ITAM Review Tools Day Snow Software ITAM Review Tools Day
Snow Software ITAM Review Tools Day
Martin Thompson
 
Tips of Selecting Digital Asset Management (DAM) Solution
Tips of Selecting Digital Asset Management (DAM) SolutionTips of Selecting Digital Asset Management (DAM) Solution
Tips of Selecting Digital Asset Management (DAM) Solution
Rajneesh Kumar
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
Ryan Gallavin
 
Isms2
Isms2Isms2
Isms2
aaditya
 
Regulatory Compliance Software
Regulatory Compliance SoftwareRegulatory Compliance Software
Regulatory Compliance Software
Softwaresolutions2
 
IPAAS_information on your terms
IPAAS_information on your termsIPAAS_information on your terms
IPAAS_information on your termsMarket Engel SAS
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
Ryan Gallavin
 
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
IBM Sverige
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
Iranna Hurakadli
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 
What’s Happening in Information Risk Management
What’s Happening in Information Risk ManagementWhat’s Happening in Information Risk Management
What’s Happening in Information Risk Management
Michael S. Gurican
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
NextLabs, Inc.
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
Courion Corporation
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
Quest Software
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
Laurie LeBlanc
 

What's hot (19)

AccessPaaS by SafePaaS
AccessPaaS by SafePaaSAccessPaaS by SafePaaS
AccessPaaS by SafePaaS
 
Rsa archer training
Rsa archer trainingRsa archer training
Rsa archer training
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
CyberArk
CyberArkCyberArk
CyberArk
 
Snow Software ITAM Review Tools Day
Snow Software ITAM Review Tools Day Snow Software ITAM Review Tools Day
Snow Software ITAM Review Tools Day
 
Tips of Selecting Digital Asset Management (DAM) Solution
Tips of Selecting Digital Asset Management (DAM) SolutionTips of Selecting Digital Asset Management (DAM) Solution
Tips of Selecting Digital Asset Management (DAM) Solution
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Isms2
Isms2Isms2
Isms2
 
Regulatory Compliance Software
Regulatory Compliance SoftwareRegulatory Compliance Software
Regulatory Compliance Software
 
IPAAS_information on your terms
IPAAS_information on your termsIPAAS_information on your terms
IPAAS_information on your terms
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
What’s Happening in Information Risk Management
What’s Happening in Information Risk ManagementWhat’s Happening in Information Risk Management
What’s Happening in Information Risk Management
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
 

Viewers also liked

8ª série 15ª lista
8ª série   15ª lista8ª série   15ª lista
8ª série 15ª listaescolazilah
 
8NE Act Two Script 21.4.2016
8NE Act Two Script 21.4.20168NE Act Two Script 21.4.2016
8NE Act Two Script 21.4.2016
Jeremy Tang
 
8 j magnets and electromagnets
8 j magnets and electromagnets8 j magnets and electromagnets
8 j magnets and electromagnets
cpugh5345
 
8 r) work with the best
8 r) work with the best8 r) work with the best
8 r) work with the bestCassidy Bast
 
8 God\'s Gift - Man Rejection
8 God\'s Gift - Man Rejection8 God\'s Gift - Man Rejection
8 God\'s Gift - Man Rejectionfsweng
 
ปฏิบัติการที่ 8 power pointครั้งที่ 1
ปฏิบัติการที่ 8 power pointครั้งที่ 1ปฏิบัติการที่ 8 power pointครั้งที่ 1
ปฏิบัติการที่ 8 power pointครั้งที่ 1teaw-sirinapa
 
8º encuentro conecta joven 2013 dosier informativo
8º encuentro conecta joven 2013 dosier informativo8º encuentro conecta joven 2013 dosier informativo
8º encuentro conecta joven 2013 dosier informativo
e-Inclusión Fundación Esplai
 
8). kinetic theory of gas (finished)
8). kinetic theory of gas (finished)8). kinetic theory of gas (finished)
8). kinetic theory of gas (finished)PhysicsLover
 
8 studenti jauniesu_diena_50ex_mb
8 studenti jauniesu_diena_50ex_mb8 studenti jauniesu_diena_50ex_mb
8 studenti jauniesu_diena_50ex_mbEgils Doroško
 
8th and last lecture
8th and last lecture8th and last lecture
8th and last lectureMostafa Ahmed
 
라이브리 8 (LiveRe) 서비스 제안서
라이브리 8 (LiveRe) 서비스 제안서라이브리 8 (LiveRe) 서비스 제안서
라이브리 8 (LiveRe) 서비스 제안서
Benjamin Kim
 
8 order is wrong, missing items
8   order is wrong, missing items8   order is wrong, missing items
8 order is wrong, missing itemsOwnerListens
 
8 easy ways to save energy in your(finished)
8 easy ways to save energy in your(finished)8 easy ways to save energy in your(finished)
8 easy ways to save energy in your(finished)RandyBett
 
8th pre alg -l4
8th pre alg -l48th pre alg -l4
8th pre alg -l4jdurst65
 
8 rad ako pisat texty urcene na preklad
8 rad ako pisat texty urcene na preklad8 rad ako pisat texty urcene na preklad
8 rad ako pisat texty urcene na prekladlexikasro
 
8th pre alg -sept17
8th pre alg -sept178th pre alg -sept17
8th pre alg -sept17jdurst65
 

Viewers also liked (20)

8ª série 15ª lista
8ª série   15ª lista8ª série   15ª lista
8ª série 15ª lista
 
8NE Act Two Script 21.4.2016
8NE Act Two Script 21.4.20168NE Act Two Script 21.4.2016
8NE Act Two Script 21.4.2016
 
8º pentecoste c 2013
8º pentecoste c 2013 8º pentecoste c 2013
8º pentecoste c 2013
 
8 j magnets and electromagnets
8 j magnets and electromagnets8 j magnets and electromagnets
8 j magnets and electromagnets
 
8 r) work with the best
8 r) work with the best8 r) work with the best
8 r) work with the best
 
8 God\'s Gift - Man Rejection
8 God\'s Gift - Man Rejection8 God\'s Gift - Man Rejection
8 God\'s Gift - Man Rejection
 
ปฏิบัติการที่ 8 power pointครั้งที่ 1
ปฏิบัติการที่ 8 power pointครั้งที่ 1ปฏิบัติการที่ 8 power pointครั้งที่ 1
ปฏิบัติการที่ 8 power pointครั้งที่ 1
 
8º encuentro conecta joven 2013 dosier informativo
8º encuentro conecta joven 2013 dosier informativo8º encuentro conecta joven 2013 dosier informativo
8º encuentro conecta joven 2013 dosier informativo
 
8Sartin_NASCAR
8Sartin_NASCAR8Sartin_NASCAR
8Sartin_NASCAR
 
8). kinetic theory of gas (finished)
8). kinetic theory of gas (finished)8). kinetic theory of gas (finished)
8). kinetic theory of gas (finished)
 
8 studenti jauniesu_diena_50ex_mb
8 studenti jauniesu_diena_50ex_mb8 studenti jauniesu_diena_50ex_mb
8 studenti jauniesu_diena_50ex_mb
 
8th and last lecture
8th and last lecture8th and last lecture
8th and last lecture
 
라이브리 8 (LiveRe) 서비스 제안서
라이브리 8 (LiveRe) 서비스 제안서라이브리 8 (LiveRe) 서비스 제안서
라이브리 8 (LiveRe) 서비스 제안서
 
8 order is wrong, missing items
8   order is wrong, missing items8   order is wrong, missing items
8 order is wrong, missing items
 
8 easy ways to save energy in your(finished)
8 easy ways to save energy in your(finished)8 easy ways to save energy in your(finished)
8 easy ways to save energy in your(finished)
 
8ª sessão retificado
8ª sessão retificado8ª sessão retificado
8ª sessão retificado
 
Money-Tor
Money-TorMoney-Tor
Money-Tor
 
8th pre alg -l4
8th pre alg -l48th pre alg -l4
8th pre alg -l4
 
8 rad ako pisat texty urcene na preklad
8 rad ako pisat texty urcene na preklad8 rad ako pisat texty urcene na preklad
8 rad ako pisat texty urcene na preklad
 
8th pre alg -sept17
8th pre alg -sept178th pre alg -sept17
8th pre alg -sept17
 

Similar to 8MANOverview

TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_EN
SaraLampret
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
VishnuGone
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Symantec
 
What Security Features Does tally prime offer for that data Protection?
What Security Features Does tally prime  offer for that data Protection?What Security Features Does tally prime  offer for that data Protection?
What Security Features Does tally prime offer for that data Protection?
Attitude Tally Academy
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
hardik soni
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023
Kim Cook
 
Content Management Companies
Content Management CompaniesContent Management Companies
Content Management Companies
Outsource Bigdata
 
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
Aelum Consulting
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
Infosec Train
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
ftculotta27
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
Seclore
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
pabatan
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
novsela
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
manoharparakh
 
Best Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LABBest Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LAB
Agaram Technologies
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
Ericom Software
 

Similar to 8MANOverview (20)

TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_EN
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
What Security Features Does tally prime offer for that data Protection?
What Security Features Does tally prime  offer for that data Protection?What Security Features Does tally prime  offer for that data Protection?
What Security Features Does tally prime offer for that data Protection?
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023
 
Content Management Companies
Content Management CompaniesContent Management Companies
Content Management Companies
 
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
Revealing the Potential of ServiceNow ITAM Functionalities That Transform Res...
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Best Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LABBest Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LAB
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 

8MANOverview

  • 1. Access Rights Management. Only much Smarter. ACCESS GOVERNANCE Access Rights Management. Only much Smarter. ACCESS GOVERNANCE: MADE EASY WITH 8MAN
  • 2. Access Rights Management. Only much Smarter. ACCESS GOVERNANCE: MADE EASY WITH 8MAN Clarity with just one click 8MAN technology scans and displays the access rights structure within an organization clearly. This makes the administration of access rights simple and straightforward. 8MAN saves time and reduces costs while also closing dangerous security gaps in data and user management. Discover a completely new way of managing roles and delegating responsibilities. Our unique Data Owner concept enables you to give business users (for example department heads) the power to manage access to their data without requiring other administrative rights. Security Transparency Efficiency Accountability Visualize access rights Identify and administrate incorrect access rights. Minimize risk Protect sensitive data by limiting access to a need-to-know basis. Enable compliance Use 8MAN as a foun- dation for compliance and legal requirements (ISO 27001, PCI DSS, SOX). Track changes 8MAN requires all changes to be commented and logged. Administrate efficiently Simple reporting and administration saves time and costs. Simplify access rights Assign access rights flexibly via role-based templates or even limit them temporarily. Automate reporting Communicate actual access rights to affected parties. Incorporate Data Owners Delegate responsibilities and processes to help- desk and individual departments. 8MAN for SharePoint 8MAN for Exchange 8MAN for vSphere 8MAN for SAP Diverse Technologies. Single Interface. 8MAN is a single platform from which any organization can manage access rights across multiple technologies. With 8MAN and its expansions, the process of access rights management is streamlined across an entire organization. In addition to the standard Active Directory and file server capabilities, 8MAN offers individual expansions for SharePoint, Exchange, vSphere and SAP.
  • 3. Contact Steven Gormly Account Manager steveng@8man.com +49 30 390 63 45-22 www.8man.com 1 Stanhope Gate Camberley Surrey GU15 3DW © Protected Networks GmbH 2014, All rights reserved. Identify discrepancies Keep access to your organization’s critical data secure. With 8MAN, the visualization of access points across IT environments quickly identifies errors and discrepancies. Enable Data Owners With 8MAN’s Data Owner features you can delegate responsibilities to department heads and project managers. Enabling Data Owners improves the quality of access rights decisions while also reducing the extra workload on your IT administrators. Generate quick reports Our comprehensive reporting suite allows administrators, managers and department heads to easily understand the existing access rights structure. Improve compliance 8MAN simplifies strenuous tasks like certification of legal and regulatory compliance standards such as PCI DSS, ISO 27001 and SOX. Support IdM implementation 8MAN provides invaluable support in IdM projects - delivering dependable and accurate information regarding the actual access rights situation. 8MAN allows you to create target/actual comparisons for more efficient IdM implementation. Efficiency, security and compliance from a single source