Data Access Governance

Manage and govern access to unstructured data.

Data Access Governance

Identity-driven data access governance

Expand your identity governance and administration program to include data stored in documents and files. Gain the same level of control over unstructured data as you have with applications.

Gain visibility into data access

Analyze file system data to gain insight into what data you have, who has access, and how access is derived. With comprehensive reporting and analysis, you can respond quickly to audit and attestation challenges.

Streamline user provisioning

Streamline user provisioning

Use identity-based policies to automatically provision data storage, assign permissions, and control access. With Data Access Governance, you can provision users more quickly and free up IT resources.

Reduce data access risk

Reduce data access risk

Monitor high-risk data, enforce lockdown and fencing policies, and notify data owners when permissions change. With identity-driven policies, you can reduce the risk of unauthorized access, non-compliance, and data breaches.

Govern access to data

Govern access to data

Improve governance and meet attestation requirements through access reviews. Business users can certify access to data in the same interface they use to govern access to applications.

Related Products

The Micro Focus Data Access Governance solution utilizes a set of integrated products with proven technology.

NetIQ Identity Manager

Manage the complete identity lifecycle of entities across your enterprise.

NetIQ Identity Governance

Govern access to applications and data across your diverse enterprise landscape.

File Dynamics

Automate file system data management and control access to sensitive information.

File Reporter

Discover and analyze file system data so you know what data you have and who has access to it.

Extending identity governance and administration (IGA) to unstructured data

Traditionally, IGA solutions have focused on governing access to data housed within applications. Now you can govern access to file-based, unstructured data.