Cloud Access Governance and Intelligence (CAGI) Overview
CAGI – AN OVERVIEW
Access Governance and Intelligence for Cloud and Enterprise Applications
Saviynt can import Access and Usage data from applications in real time or batch basis, analyze the data against industry leading controls, provide exceptions / violations and remediate exceptions. In addition, Saviynt provides the ability to Mine / Design Functional Roles and Attribute Based Rules based on user data, attributes and usage. These roles can be provisioned back in the application where applicable and can be monitored in real time for violations.
Data Access Governance for Office 365, Box and Dropbox
Out of box integration with collaboration platforms like Office 365, Dropbox and Box to classify and rank the data based on risk, tag the data with the correct risk level, review who has access to critical data inside and outside the enterprise, review who is accessing critical data, review / investigate alerts based on leading IT security controls and behavior analytics to remediate any anomalies.
Data Access Governance for Hadoop and SAP Hana
Out of box integration with Big Data Platforms such as Hadoop and SAP HANA including support for Cloudera and Hortonworks. Saviynt allows data stewards and information security teams to build data access rules in business terms. Saviynt Role Generator translates these business rules into implementable roles that are created in Hadoop or HANA. Saviynt provides the ability to provision these rules automatically in the big data platform. In addition, Saviynt provides real time monitoring of these rules based on the changes in underlying access and activities.
Out of Box IT Security, Risk and Threat Controls Mapped to Application
Out of Box Segregation of Duties, Critical Access and Compliance Controls
Industry leading Role Mining and Attribute Based Access Controls (ABAC) rules design
Saviynt provides industry’s leading role and rule mining and design engine. Saviynt team has over 20 years of experience in providing role mining solutions. Saviynt uses a combination of user attributes, user access and activity to help predict roles. Saviynt role design engine supports Enterprise Roles, Functional Roles, Application Roles, Dynamic Roles, Birthright Roles & Attribute Based Access Management Rules
Most Intuitive and Easy to Use and Configure Access Request System
Saviynt provides the most intuitive and easy to configure Access Request System. Enterprises can literally onboard applications in minutes and hours without writing a single line of code!
Saviynt provides preventative Segregation of Duty and IT security controls testing during the request process allowing the security team to block the request or assign a mitigating control. Approval workflow definition is based on easy to use interface which can be used by a security analyst – does not require any development skills.
Advanced signature less behavior based analytics that continuously builds User, Resource and Peer Group behavior. The solution detects anomalies at run time and provides a complete investigation workbench and case management capabilities.