Features

Enables you to view unstructured data repositories during an access review

Because Micro Focus Data Access Governance (Powered by File Reporter) integrates fully with Micro Focus Identity Governance 3.5, your access reviews can now include network file system shares and folders storing potentially confidential information.

Read more ›
Determines quickly who has access to high-value targets

When it comes to the storage locations for confidential and sensitive information on the network, some shares and folders are more important than others. The information located in the files stored in these “high-value targets” need to be protected. The first step is determining all of the users in your organization who have any sort of access permissions.

Read more ›
Identifies all network folders that a specific user can access

If an internal security breach took place and you needed to determine all of the areas in the network file system that the culprit had access to, could you do so? By generating a Permissions by Identity report you can find all of the locations on the network that a given user can access, along with the specific assigned or inherited permissions.

Read more ›
Compares permissions between two points in time

What do you do when your organization passes a compliance audit on one occasion, and then a few months later in another audit it fails? The easy approach would be to compare the permissions from the first audit with those of the second to see the differences and determine what you need to address. That’s what Historic Comparison reports are all about.

Read more ›