Traditionally, leading Identity and Access Management (IAM) and Identity Governance and Administration (IGA) products have focused on governing data access to applications and the data housed and controlled by those applications. But what about the data outside the scope of applications?
Analysts have concluded that the “elephant in the room” is the lack of governance for organizations’ unstructured data, that is, file-based data that make up more than 80 percent of organizations’ total data. When it comes to access to sensitive files in unstructured data, the NetIQ Data Access Governance solution provides an integrated product approach to reporting, correcting, and certifying proper access through access reviews.
Corporate security practices, research, best practices, standards, legislation, and the ideas of thought leaders are all contributing to an evolving list of requirements for a comprehensive DAG solution.
Each of these categories is detailed in this paper.
Read this white paper to discover how to extend identity governance to include data stored in files.