8MATE for vSphere

You are here

Problem

To review the permission situation in the vSphere client, administrators must look at each and every resource individually. This is also aggravated by the complexity of possible privileges (user rights).

The permission rights in vSphere can be extensive. The "create snapshot" function, for example, enables copying a virtual machine in just a few steps, Rights such as these create wide-open exposure to data theft. Therefore, transparency in permissions on virtual servers is of paramount importance.

 

Solution

The 8MATE for vSphere scans and searches permissions of all vSphere resources. It also shows through which group memberships a user receives rights. Thus, the 8MATE creates the prerequisites for early detection of harmful security vulnerabilities. For standard processes, 8MATE has preconfigured permission concepts on file. An actual-ideal comparison is used to determine the appropriate permission concept for each role. Unnecessary permissions can subsequently be removed in vSphere.

The 8MATE for vSphere has a special functional feature. Controversial rights, such as "Create snapshot" can be called up directly in 8MATE. In an overview you see immediately who has this permission on which virtual machines.

 

About 8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimization and User Provisioning. The software solution - a product of Protected Networks - is developed in Germany. 

 

 

It redefines standards for professional network security and efficient user management and combines advanced functionalities with meeting current security and compliance regulations.

Service

Contact