pGet in touch with us:  +44 (0) 1252 757181

8MAN

Access Rights Management, Only Much Smarter

8MAN helps clients secure their sensitive and proprietary data from unauthorized internal access by providing an enhanced overview, administration and documentation of all users and permissions. 8MAN provides clarity in just one click.

8MAN offers a technology that secures sensitive corporate data from unauthorized internal access.


Overview

8MAN provides an intuitive overview of all permissions for environments such as Active Directory, file servers, SharePoint and Exchange.

Administration
8MAN allows you to make changes to permissions or directly within Active Directory including enriched functionality such as temporary permissions and role based access templates.

Authorization
With 8MAN, you can ensure that all parties are involved in the process of access rights management. Setup scheduled reports, delegate tasks and ensure that everyone is properly informed.

Delegation
Structure efficient workflows allowing the appropriate person to authorize access to shared areas. Involving the people who use and create your data in access rights decisions is the key to efficiency and accuracy.

Documentation
8MAN provides a full audit trail of all permissions and changes, allowing you to easily answer any audit or compliance question. Make sure all changes are fully documented thereby reducing operational and data security risks.

Security
Visualise ResourcesRecognise discrepancies at a glance and optimize.
Minimise Risk Protect relevant company data through efficient permissions management.

Efficiency
Speed Up Permissions Allocations Save time via a dashboard and searching through fast and precise results
User Provisioning Allocate or revoke access with flexibility based on time or role.

Responsibility
Reports Automate Time-controlled communication of actual permissions to those responsible
Involve Data Owners Define and control responsibilities for resources

Transparency
Reinforce ComplianceUse 8MAN as a basis for certified security (BSI, PCI-DSS, BDSG, etc.)
Document Changes Enter obligatory commentary during the allocation process

Get in Contact






RealServe IT’s expertise and experience within the virtual desktop space allowed us to make informed design decisions, which in turn meant we were able to define our project requirements more efficiently.

Kevin Page - Systems Development & Integration.

Capgemini

We are delighted to have been working with RealServe IT since 2008 and have no reservations in highly recommending them as a consulting partner; to provide expert services for our Atlantis ILIO product portfolio.

Rajiv Pimplaskar - Vice President of Sales.

Atlantis (Vendor)

The knowledge and flexibility of RealServe IT allowed them to work with us and not for us. They recognised our own skills and worked with us to architect a superior solution at a fraction of the time and cost.

Antony Pugh - IT Service Delivery Manager.

Berendsen UK Limited

Our Partners