What is Access Rights Management (ARM)?

<< Inhaltsverzeichnis anzeigen >>

Navigation:  Start > 8MAN Basic Knowledge > 8MAN FAQ >

What is Access Rights Management (ARM)?

Access Rights Management prevents unauthorized access to data and optimizes security-relevant processes within the company network.

 

8MAN Access Rights Management (ARM) is based on 5 core disciplines:

 

PERMISSION ANALYSIS

Shows the permissions in your company across resources.

 

DOCUMENTATION & REPORTING

Records access rights activities in the logbook and creates audit-proof reports.

 

SECURITY MONITORING

Monitors security-relevant processes in Active Directory, Exchange and on your file servers.

 

ROLE & PROCESS OPTIMIZATION

Shortens your access rights management process and involves only the necessary actors.

 

USER PROVISIONING

Controls the creation of new user accounts, rights management, and account details editing.

 

 

In addition, there are the following additional disciplines:

 

RESSOURCE INTEGRATION

Allows administration of additional resources.

 

APPLICATION INTEGRATION

Enables automated collaboration with other applications in your software landscape.

 

THREAT & GAP MANAGEMENT

Removes security-critical authorization errors automatically and standardizes the rights system according to your specifications.