Sie sind auf Seite 1von 2

www.brainwave.

fr
Regain control of your Identities!
BRAINWAVE IDENTITY GRC
Your company is evolving in an ever changing environment: increasing regulatory pressure, traditional IT infrastructures teared
down by the Cloud paradigm, multiplication of devices and users... More than ever, you have to ensure that only the right people
can access sensitive information and ressources. The stake is crucial but the means are not obvious. Identity and ccess
!overnance "I!# is the answer. I! assists by compiling an e$haustive and detailed inventory of users and their privileges on
information systems. I! automates security, compliance and segregation%of%duties controls in order to report on report
operational risks. I! also embraces access reviews, gap analysis and e$ception management.
&n the other hand, the deployment of an I! solution should not be a heavier burden than the problem it solves(
)ser *ntitlements cartography
+ata ,uality inspection
ccounts review
Compliance management
-egregation of +uties management
.ole modeling
/inner of the Innovation wards from 0les ssises de la -1curit12 in Monaco in 3455, 6rainwave is used by many companies
as the ne$t%generation I! solution. 6rainwave Identity !.C is a lightweight software solution that readily integrates with your
Information -ystem with the lowest impact. 6rainwave Identity !.C automates your audit control plan and provides business%
oriented insight on your current situation. t any time, you can report on who has access to what, identify issues and take action.
You are finally in a position to drive the Information -ystem security. You regain control(
Supported systems
7eople-oft
&racle e6usiness suite
-7
8. ccess
.C9
Top -ecret
-hared folders
ctive +irectory
-harepoint, *$change
+omino
C&+
&racle, -:; -erver
Tivoli Identity Manager
<7= systems
;+7 directories
6espoke applications...
Identity GRC at a glance
Data feed
-olution without connectors
utomated, regular feed
-upports all applications
Many pre%configured applications
!raphic configuration and development
Data model
.eady to use data templates
utomated audit logging
uthori>ations, logs and
theoretical entitlements
Change detection
Controls and analyses
+ata ,uality measurement
Management rules controls
7rivilege controls
-egregation of +uties "-o+#
Crosstabs "&;7#
-hared directory analyses
-hare7oint analyses
8istory analyses
9orensic analyses
.ole consolidation
=atural language configuration
Reporting
Customi>able /eb 3.4 portal
+ynamic dashboards
utomated reports emailing
Indicators and trends
Compliance metrics
nomalies and e$ceptions monitoring
Incremental review reports
6usiness oriented reports
More than 5?4 out%of%the%bo$ reports
More than 3@4 out%of%the%bo$ analyses
Multi%format reports "M- &ffice, A#
!raphical report editor interface
Architecture
B%tier Cava product architecture
/indows and )ni$ compatible
&racle, -:; -erver and 7ostgre-:;
/eb-ervices interface access
I*D, 99, Chrome, -afari compatible
Data extraction, audit trails
Cloud
pplications
+irectories Infrastructure
*CM
Mainframes
.eports
/eb portal eMails
nalysis
6.I=/<*
7aris, 9rance
contactEbrainwave.fr
Tel : FBB 5 ?@ 5G 4@ 54
9a$: FBB 5 ?@ 5G 4H 45
www.brainwave.fr
They put their trust in us
6rainwave Identity !.C is the answer to the mapping and control of user
entitlements in your Information -ystem. 6rainwave Identity !.C collects data
coming from all application silos and consolidates them in an Identity%oriented,
historised repository. 6rainwave Identity !.C allows you to rapidly establish the
comprehensive list of people with access to the Information -ystem, their
access privileges and to see if these accreditations are legitimate under different
applicable rules. 6rainwave Identity !.C is a simple and pragmatic answer to
the identification of problems with data ,uality, compliance management and
segregation of duties. 6rainwave Identity !.C streamlines account review
campaigns, monitors remediation and e$ceptions and can even help putting
together role models.
The solution draws on simple data e$tractions and is nonintrusive on the target
systems. It can be set up in Iust a few days and will manage all kinds of
accreditations: roles, profiles, sensitive transactions, systems access, access to
shared directories, -harepoint access, physical access, cloud applicationsA
The solution is also pre%configured to rapidly audit numerous software packages
"-7, &racle e6usiness -uite, -harepoint, /indows servers, .C9A#. It is
ideal both for carrying out spot checks and for automating account reviews and
audits in a continuous improvement process approach.
Information is provided to all security managers via a /eb 3.4 portal whose
content adapts automatically to the needs and privileges of recipients.
6rainwave Identity !.C provides over 5?4 out%of%the%bo$ reports and 3@4
analyses that can be interrogated in detail. In addition, the solution is able to
send reports automatically by email to the different recipients.
)sed daily by the CI-&, data privacy officers, entitlements managers and
auditors 6rainwave Identity !.C improves your performance, reduces your
operational risks and allows you to meet the challenges of regulatory
compliance "6asel II, -olvency II, C.69 GD%43, *)%+7+, I-* B@43, -- D4,
7CI%+--A#.
To sum up...
7ublication of results
8ow it works
The Identity !overnance -olution

Das könnte Ihnen auch gefallen