Cookie Policy
We use cookies to improve your experience on our website. If you continue without changing your cookie settings on your browser, we'll assume that you are happy to receive all cookies on the Zycko website. To learn more about how we use cookies, please see our cookie policy.
 
 
 

RELEASE NOTE: 8MAN 5.7 IS NOW AVAILABLE

In keeping with the start of the new year, we would like to introduce our new 8MAN version 5.7. This version includes many new features, e.g. 8MAN for Exchange now includes even more modification functions.

 

8MAN TESTIMONIAL

"When we had finished the test run of 8MAN and saw all the 'sins' of the past, it was a real eye-opener." - Meinolf Zimmermann, IT Director of the City of Höxter

 

"We want to simplify the administration of rights and bring responsibility directly to the data owner. This has reduced our workload and increased our speed. Also, the internal review now has the option of directly viewing permissions." - Alexander Schanz, IT Leader Deutsche Flugsicherung

 

“The considerably better reporting of the actual permissions in AD is important for us.” - Stefan Brüggemann, Head of Atotech Worldwide IT Operations

  • Features

Made in Germany!

The 8MAN permission technology was developed by the Berlin-based company Protected Networks GmbH. With 500 customers, Protected Networks GmbH is the worldwide market leader in permission management with its technology.

A simple and complete overview of all permissions creates clarity!

HOW DO I KNOW WHO HAS ACCESS TO WHAT?
With 8MAN, companies get a simple, complete overview of all permissions - across all systems and locations. This leaves no threat undiscovered, not even a recursion at permission level 35.

  • a central solution for all systems
  • security in outsourcing situations
  • recognize excessive permissions
 

8MAN documents everything!

WHO ACCESSED WHAT DOCUMENTS WHEN?
To what documents did "Fred Chen" have access on 07/23/2012? All changes to user rights and group memberships are documented by 8MAN. This includes any unauthorized access. Security breaches can thus be quickly cleared up or even

  • scan comparison shows the difference between different time points
  • create conditions for ISO certifications
  • provide quick answers on reviews and audits
   

Everything is traceable!

HOW CAN I MAKE INFORMATION AVAILABLE QUICKLY AND ANSWER QUESTIONS?
Being able to demonstrate IT compliance often takes weeks for IT staff. With 8MAN, you can immediately answer many questions by auditors. And not only that - auditors can even create reports themselves.

  • Who has access to what?
  • Was there unauthorized access?
  • Are there any recursions?
   

Intelligent search!

HOW CAN I QUICKLY ACCESS INDIVIDUAL PIECES OF INFORMATION?
iSearch – the unique free-text search. Whether a directory, attribute or group: 8MAN iSearch offers extensive configuration and application options.

  • simple search through all elements
  • search results can be directly managed
  • browsing attributes, such as telephone numbers, is also possible
   

Assign temporary permissions!

HOW DO I DEAL WITH PERSONS WHO SHOULD ONLY GET ACCESS RIGHTS FOR A SHORT PERIOD OF TIME?
Permissions and group memberships can be assigned with an expiration date. This provides security in dealing with trainees, holiday cover, interns or even consultants.

  • assign temporary rights without notes and manage safely
  • prevent excessive permissions and thus comply with the need-to-know principle
  • display flexible team structures

 

Back to Top
For more information:
Contact our specialist teams
 
 
For a database of user manual, datasheet, or software update, please access the Resource Centre