Tenfold - Next generation Access Rights Management - DBL Software
Next generation permissions management
Offering the ability to simply control permissions, avoiding disorganised and unsafe permission structures.
With Tenfold, user accouts can be generated automatically, including data controllers in every step of the workflow.
- User and Permission Managenment
Controlling permissions is key to security. With tenfold, you can generate user accounts automatically, visualise permissions and involve data owners in every step of the workflow. Document all permission changes automatically.
- Permissions Analysis
Using statistical analysis to evaluate permissions will help you recognise patterns and overlaps within your permission structures. Tenfold can enhance your permission management and analysis capabilities for Active Directory and file servers, but also for Exchange, SharePoint and even third-party systems, like SAP ERP, various CRM systems, Office 365, ticket systems and self-developed solutions.
- Documentation and Reporting
Knowing who has access to specific critical data and who approved or made changes eliminate data abuse. tenfold saves all users history and their permissions and any subsequent change is blocked.
- User Lifecycle Management
Control the Joiner/Mover Leaver problem by ensuring that staff permissions are administered and documented transparently, from the day of entry to the company, to the day of exit. A further feature In tenfold, your users can reset their own passwords for Active Directory®, SAP® and other applications independently, freeing up helkpdesk time.
Regularly check to be sure the IT access rights that have been assigned to your users are still relevant and necessary, identifiying and removing privileges that are no longer needed.
- Smart IDM
Provides the smart solution and support for your identity management & access management (IAM) strategy. tenfold identity management system software (IDM software) is quick to install and easy to use. It supports systems such as Active Directory® & file servers, SharePoint®, Exchange®, as well as various ERP and CRM systems (e.g. SAP®). Ensuring that all user data and permissions related to these systems are administered centrally in one single system.