Achieve Compliance and Reduce Risk
Virtually every regulation has requirements to manage user rights to sensitive data. Complying with these requirements is one of the most difficult tasks to carry out effectively, despite built in database controls. User Rights Management for Databases (URMD) helps you establish an automated access rights review process to eliminate excessive user rights. It also enables you to demonstrate compliance with regulations such as SOX and PCI DSS. URMD lowers IT labor costs associated with database user access management.
Streamline User Access Compliance
URMD allows you to easily demonstrate an automatic, repeatable process for reviewing access rights, which is a requirement of regulations like SOX 302 and 404, and PCI 7 and 8.5. URMD includes a workflow framework to support user rights review and authorization processes.
Save Time by Automatically Connecting the Dots
Discover the information you need to reduce the risk of unauthorized data access without spending countless hours attempting to do it manually. URMD automatically correlates user rights with information about data sensitivity, quickly clarifying important relationships.
Discover and Remove Excessive Access and Dormant Users
Hackers look for easy opportunities to access sensitive data. User accounts with a lot of access to data are valuable targets because they provide a lot of leverage. So are dormant user accounts because suspicious activity, such as unexplained changes, go unnoticed by the account owner. With URMD, you are able to reduce the chance of a security breach by identifying users with excessive access rights, as well as dormant user accounts.
User Rights Management for Databases Specifications
Specification Description Supported Database Platforms
- Oracle Exadata
- Microsoft SQL Server
- IBM DB2 (on LUW)
Centralized User Rights Management
- Aggregates user rights across all corporate databases into a single repository for centralized management
Access Rights Review
- Enables automated, repeatable process for reviewing user access rights
Excessive User Rights Analysis
- Supports comprehensive investigation of excessive
- User rights
- Add user organizational details (role, department, manager, etc.) to help validate access base on 'need-to-know'
- Canned reports show effective user rights, permission grants, role grants, unapproved rights and unused rights
- Compliance Report streamline reporting on user access rights to sensitive data. User Rights Change Log demonstrates the existence of a user rights review process.
- Custom reports can be easily created to document analysis results
- Authorize or request to revoke user access rights based on analysis results
- Add on option to all SecureSphere Database Security product platforms including virtual platforms
- Time based licenses: expire 30 days after activation
- Perpetual licenses: no expiration date
When integrated with Database Activity Monitoring or Database Firewall: Rights usage Analysis
- See how often user rights are used and last usage date
- Find users who haven’t used their privileges for a while
- Shows the last time an account has been active on the database