tenfold Archives - Cyber Secure Forum | Forum Events Ltd
Posts Tagged :

tenfold

How to simplify access reviews

960 640 Guest Post

By Tenfold Security

More and more cybersecurity regulations require businesses to restrict access to data on a need-to-know basis. This best practice is also known as the principle of least privilege. Put simply, it means that members of your organization should only have access to files and resources they absolutely need in order to do their job.

But how do you make sure that’s the case? How can you be certain that not a single employee at your business has more permissions than they actually need? The answer is: You have to check. Every permission in your organization must be checked through a process known as a user access review (which are also increasingly mandated by laws and security standards)

If that sounds like a logistical nightmare, that’s because it is!

Once your company reaches a certain size, it becomes virtually impossible to conduct access reviews by hand. Tracking hundreds or thousands of permissions across various systems would take so much effort that by the time you finish, you’d already be late for your next access review.

If you’re faced with having to audit every permission at your company, you need help. Especially if you’ve never gone through your access rights before.

tenfold’s identity and access management solution will actually help you in two ways: First, by automating user management, tenfold helps you eliminate unnecessary permissions, which drastically reduces the scope of your access review, as well as boosting your IT security. By defining a default set of permissions for different roles and departments (tenfold will support you in finding the optimal configuration), our IAM platform can automatically adjust permissions as needed when users switch roles, go on family leave or depart your organization.

Second, tenfold actually allows you to automate the access review process. Instead of having to manually track permissions, tenfold provides automatic notifications and a concise report, allowing you to renew or remove permissions with a single click. All settings, from the review interval to the stakeholders involved in the review, can be adjusted to your needs.

Learn more about the advantages of tenfold IAM!

Joiner-Mover-Leaver process: Solve it once and for all?

960 640 Guest Post

By Tenfold Security

JML processes give IT and HR departments regular headaches and often create quite hefty conflicts between those two departments. What is this all about?

When a new employee joins your organization, HR will know about them first, as they sign the contracts and do the onboarding. Today, many employees will require IT system access in order to fill their job role. That means IT needs to know about new hires so they can onboard them as well with all the necessary resources:

  • Client hardware (PC, Laptop, etc.)
  • Active Directory accounts, group memberships
  • E-Mail access, distribution groups, access to shared mailboxes
  • Access to applications like ERP or CRM

If HR fails to pass on that information (for whatever reason), you might end up with a new employee not being productive on their first few days, because they can’t access important systems and data. This is not only a loss for the company, but also creates great frustration for the new hire.

The same challenge arises if HR forgets to inform IT about employee that has departed from the organization recently. The result are orphaned user accounts that pose a huge security risk and generate costs in the form of unused software licenses.

How to solve the issue? We at tenfold, the leading mid-market Identity & Access Management solution propose the following:

  • If you manage less than 500 users, let HR manually input new hires, leavers and data changes (for example last name changes or new telephone numbers) into tenfold. Our software will then distribute those changes to Active Directory and other systems. Your HR users don’t have to be domain administrators for this to work.
  • If you manage more than 500 users, attach your HR management or payroll system directly to tenfold to automate the whole process. Read all about how this is made possible by the tenfold Import Plugin: https://www.tenfold-security.com/en/import-plugin-tenfold/

If you would like to learn about the basics of access management in Microsoft environments (structure, access right levels, access control lists, inheritance) then download our detailed white paper “Best Practices For Access Management In Microsoft® Environments” at this link: https://www.tenfold-security.com/en/whitepaper-best-practices/  

Want to try tenfold for yourself? No problem, just register to download our free trial https://www.tenfold-security.com/en/free-trial/

Identity Access Management vs. Access Rights Management – What’s the Difference?

615 410 Guest Post

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions.

Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/

If you are looking to secure data access in your organization by:

  • Getting more visibility out of your Active Directory environment
  • Want to manage file server access rights in a best practice compliant way
  • Want to automate your user lifecycle tasks
  • Let users request access and have your business owners approve requests
  • Achieve compliance for need-to-know permissions

Then try tenfold for free today and see how we will be able to make your IT infrastructure more secure from day one.

Request free trial at: https://www.tenfold-security.com/en/free-trial/