Promote This Nomination

Share on FacebookTweet about this on TwitterShare on LinkedIn
ERAM SAVED IMAGE FOR EZINE
T4E_logo_FC_LC
  • Company (that provides the nominated product / solution / service): Tools4ever
  • Website: http://www.tools4ever.com
  • Company size (employees): 150
  • Product Version Number: 2.2.3
  • Type of solution: Software
  • Year this product or service was first introduced to the market: 2016
  • Year the current version of this product or service has been released: 2016
  • Approximate number of users worldwide: 30000

In 3 bullets, summarize why this product or service deserves recognition

• Better insights – ERAM offers enhanced insight into the actual access privileges for the file system. The ability to provide insight into access privilege pollution in the file system, to clean it up and to prevent future pollution.
• Compliant - The ability to be compliant and meet the audit requirements ensures the organization reduces risks. This safeguards the business operations and prevents sensitive business information ending up in the wrong hands.
• End user - End users know what they can expect. They do not have superfluous access privileges, and any required additional privileges can be requested quickly and easily.

In less than 300 words, summarize the most important features and benefits of this product or service

ERAM enables organizations to streamline and optimize access control for unstructured data. It shows who has access, who should have access, who owns the data, who has tried to access certain data and where sensitive information has been stored. This will allow you to define what the access should look like, so that ERAM can ensure it is set up correctly.

Collection – The Collection module uses ERAM agents to collect all access rights from the various sources and saves these in a centralized database. It collects all data in one go, but is also capable of continuously monitoring which changes occur and register these.

Reporting – This module offers reports including:
• The access to a file/directory through more than one group membership
• User accounts that no longer exist in Active Directory
• Duplicate access privileges for the file/folder of a user or group
• Recommendations with regards to the set of rights that can be reduced based on the actual activities performed by an employee.

Interactive – This module makes it possible to browse all access privileges through a single tree view. It provides direct insight into the resources to which employees have access (People to Files), who has access to a particular resource (Files to People) and which actions have been performed on the resources by whom.

Monitoring – ERAM is able to keep track of each action performed on unstructured data and intervene where necessary. Through proactive monitoring, triggers can be set for data and persons that require an action when a particular event takes place. Reactive monitoring offers the possibility to answer questions based on previous actions.

  • Vote For This Nomination

Leave a Comment.

You need to be a registered member to comment on this nomination.Please register

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.