We’re developing a version of our software for the cloud to combine quick, powerful analysis and report generation with the convenience of ‘on-line’ and we would appreciate your input. By completing the following questionnaire you’ll help us to understand which features to include and to explore the sensitivities around storing data in the cloud. There are explanatory notes alongside to help those less familiar with idax and upon completion, the option to sign up to be a beta trialist. We look forward to bringing our new product to market soon and thank you for your time.
HOW DOES IDAX WORK?
Using just two csv. files (one for ‘HR data’ and one for ‘Permissions’) and absolutely no business context, idax is able to deliver out-of-the-box capability helping organisations to deliver on a number of key Identity and Access goals: Providing clear visibility of who has access to what, determining how risky current access levels are, making entitlement reviews easier and less painful for the business and delivering true Attribute Based Access Control (ABAC).
WHAT DATA DO I HAVE TO UPLOAD TO THE CLOUD?
HR Data: We only need to take ‘name’, ‘role’, ‘department’ and ‘manager’ as a minimum but can include as many attributes as you like such as ‘location’, ‘clients’, ‘projects’ and ‘tenure’. The more attributes you load in, the more you can use to generate Attribute Based Templates.
Permissions: The permission file could be downloaded from Active Directory, LDAP, or any file that links access rights to people.
WHAT FUNCTIONALITY DOES IDAX DELIVER?
The following functionality comes from our ‘diagnostics and governance’ feature set and is what we’re considering putting in our cloud offering. The full enterprise version delivers review capabilities and complete API integration with incumbent software solutions:
People View: Allows you to select an employee and get a list of their access/permissions and an analytic view of what they should have access to.
Asset View: Select any entitlement and get a list of people who have that entitlement. idax will also automatically wight your assets based on the distribution across the organisation, so you know which ones to focus on and which are less important/risky.
Key Risk Indicators: Using proprietary algorithms, idax will generate Key Risk Indicators for each user individual indicating the level of risk present in their permissions on a scale of 0 (low) to 10 (high).
Template Generation: idax automatically generates access templates dynamically and in real time based on the distribution and weighting of permissions across the organisation. You choose the attributes to generate templates against and idax brings back a best match template for you to permission against with the permissions for that role and department.
Template Test: This enables you to upload a access templates and have idax quickly and accurately (within minutes) provide a report showing to what extent each individual’s access matches their template.
Tasks/Workflow: Throughout idax you can generate tasks based on what you see and then track and monitor them.