White Paper

NetIQ Data Access Governance (DAG) Solution

Traditionally, leading Identity and Access Management (IAM) and Identity Governance and Administration (IGA) products have focused on governing data access to applications and the data housed and controlled by those applications. But what about the data outside the scope of applications?

Analysts have concluded that the “elephant in the room” is the lack of governance for organizations’ unstructured data, that is, file-based data that make up more than 80 percent of organizations’ total data. When it comes to access to sensitive files in unstructured data, the NetIQ Data Access Governance solution provides an integrated product approach to reporting, correcting, and certifying proper access through access reviews.

Corporate security practices, research, best practices, standards, legislation, and the ideas of thought leaders are all contributing to an evolving list of requirements for a comprehensive DAG solution.

These can be categorized as follows:

  • Data ownership reporting
  • Security reporting
  • Change notifications
  • Line-of-business data owner engagement
  • Business-level security abstraction
  • Lifecycle management
  • Security lockdown
  • Security fencing
  • Access review Attestation

Each of these categories is detailed in this paper.

NetIQ Data Access Governance (DAG) Solution

Read this white paper to discover how to extend identity governance to include data stored in files.

Learn more: download the report today

release-rel-2024-07-02-9457 | Tue Jul 16 21:14:50 PDT 2024
Tue Jul 16 21:14:50 PDT 2024