NetIQ Minimizes Risk Of Unauthorized Access And Entitlement Creep
Access Governance Suite 6 delivers access recertification, job role management, automated access request management
May 10, 2012
PRESS RELEASE
HOUSTON, TX, May 2, 2012 – Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. Add an ever-increasing number of applications and systems and an uptick in cloud-based applications permeating corporate environments, and overall visibility of and control over what end users have access to and how they are using that access is difficult to validate.
To improve how business owners dynamically track and report on the constant changes in roles and responsibilities, entitlements, employee departures and “time-bound” access, NetIQ® today announced the availability of Access Governance Suite 6 (AGS 6). An integral offering in the company’s Identity and Access Governance solution set, AGS 6 delivers access recertification, job role management, automated access request management and more to:
? Reduce risk, cost and complexity: Replace error-prone manual procedures with an automated approach for requesting, reviewing, certifying and remediating user access—reducing the time and costs associated with demonstrating compliance.
? Dynamically manage change: Manage changes to user access requirements while speeding up access delivery and avoiding potential compliance violations.
? Govern enterprise policies across IT policy domains: Enforce enterprise security business rules—such as Separation of Duty (SoD) policies—while allowing business unit-specific access policies to govern information resources.
? Identify business risks stemming from user access: Gain a business-relevant, comprehensive view of access rights, complemented by powerful analytics, toreveal risks and anomalies that need review and remediation.
? Implement sustainable compliance procedures: Create an auditable record for access policy management that proves compliance with pertinent regulations.
This latest release adds enhanced risk-based analysis and scoring to standard access request, access certification and role management capabilities to highlight end users who, based on their entitlements, may merit additional scrutiny or review. Additional features include an enhanced, user configurable interface as well as broader platform, database and web server support.
“With the movement to cloud-based applications, organizations are even more challenged to attain a level of visibility and control over user access and entitlement creep, which impacts their ability to meet compliance requirements,” said Tom Crabb, manager of Product Marketing at NetIQ. “AGS 6 builds on NetIQ’s decades of identity lifecycle management and access governance experience and provides businessowners with answers to the age-old question of ‘who has access to what’ with actionable intelligence required to fully protect corporate data regardless of where it resides and maintain compliance postures on an ongoing basis globally.”
Availability and Pricing
NetIQ Access Governance Suite 6.0 is generally available today, with enterprise pricing of $64 per user. Customers on version 4.x and 5.0.1 can upgrade to this latest version free of charge. For more information, visit www.netiq.com/ags.
About NetIQ
NetIQ is an enterprise software company with relentless focus on customer success. Leveraging its WorkloadIQ approach, NetIQ helps customerscost-effectively tackle complex information protection challenges such as FISMA, FDCC/SCAP, PCI DSS, HIPAA, SOX and NERC CIP and securely deliver and manage computing services across physical, virtual and cloud computing environments. For information on how our solutions yield reduced cost, complexity and risk, contact us.
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024