NetIQ Data Access Governance (DAG) Solution
Traditionally, leading Identity and Access Management (IAM) and Identity Governance and Administration (IGA) products have focused on governing data access to applications and the data housed and controlled by those applications. But what about the data outside the scope of applications?
Analysts have concluded that the “elephant in the room” is the lack of governance for organizations’ unstructured data, that is, file-based data that make up more than 80 percent of organizations’ total data. When it comes to access to sensitive files in unstructured data, the NetIQ Data Access Governance solution provides an integrated product approach to reporting, correcting, and certifying proper access through access reviews.
Corporate security practices, research, best practices, standards, legislation, and the ideas of thought leaders are all contributing to an evolving list of requirements for a comprehensive DAG solution. These can be categorized as follows:
- Data ownership reporting
- Security reporting
- Change notifications
- Line-of-business data owner engagement
- Business-level security abstraction
- Lifecycle management
- Security lockdown
- Security fencing
- Access review Attestation
Each of these categories is detailed in this paper.
NetIQ is part of CyberRes, a Micro Focus line of business.
Read this white paper to discover how to extend identity governance to include data stored in files.
Note: This asset is translated in English only.