You are here


Step 1: Select a base version


With 8MAN Visor you analyze the authorization situation in your company and generate reports for internal audits and reviews.

In addition to the Visor benefits 8MAN Visor DO allows you to designate data owners. With this feature, management personnel carry out the permissions analysis of their employees themselves.

With 8MAN Enterprise you broaden your security and effiency. Say "Goodbye" to standard OS tools and administer access rights directly in 8MAN. Data owners, help desks and administrators profit from easy and fast set-up of users, rights administration across resources and efficient account management. With 8MAN the entire user provisioning process is centralized.

Step 2: Select your 8MATEs

Security Monitoring

Our 8MATES allow you to expand the functionality of the base technologies. Our Loggas for Active Directory and file server expand 8MAN's capabilities by providing full-scale monitoring of activities.  


Role & Process Optimization

Access management is among the most time-consuming processes in IT-dominated companies. The GrantMA workflow turns the decision-maker into the administrator. It takes only one step to assign access rights to employees. The consequences: The administrator now has time for what is really essential.   



By creating the 8MATES, we are pursuing our vision of integrating more and more permission-based software into the 8MAN technology. Our vision is to provide an interface with which you can analyze and administer all applications.
In addition to the base technologies, Active Directory and file server, we have succeeded in linking the following systems: vSphere, Exchange and Sharepoint.


Your focus Function Visor VisorDO Enterprise
  Security Permission Analysis

Multi-domain capable:

Analyse the different domains in your overall structure.
Parallel scans:
The greater the number of threads, the faster 8MAN scans your resources. 
4 Threads 128 Threads 128 Threads
Accounts (Graph):
Display of the permissions situation as it exists in your environment.

Analysis of Active Directory (AD) and access authorizations 
Determine the rights of a user to various AD objects.

Documentation & Reporting

8MAN logbook
Overview of the activities completed in 8MAN in Active Directory, file server,
SharePoint and Exchange over time. 

Reports on the actual status 

  • Access rights of individual employees to resources
  • Groups and users with access rights to the resources (file server)
  • Detailed account report
  • Scan comparison: Changes of the actual status between points in time 

Scheduled reports
Automatic distribution of defined reports 

Reports on security relevant activities on Active Directory
Reports on security-relevant activities on the file server (file level)
Security Monitoring
Active Directory Monitoring
Monitors Active Directory Security-relevant activities are recorded in the log book.
File server Monitoring
  • Monitors your file servers. Security-relevant activities are tracked down to the file level
  • Your output format are structured reports
  Efficiency Role & Process Optimization

Designate data owner:
Assign monitoring and administration of permissions and rights to managers

  Analyze only
Purpose Groups :
Give meaningful names to AD groups

Allow authorizations to be ordered:
Employees order additional authorizations from their data owner. .

User Provisioning
User set-up::
Standardized user creation by data owner or help desk
Access rights management :
Modify authorizations and AD groups via drag & drop.
Account Management :
  • Modify attributes 
  • Reset passwords
  • (de)activate and delete accounts
Groupwizard :

Automatic creation of AD groups when granting rights on
a file server (Microsoft best practice).

Temporary authorizations:
Define the period of time for an authorization. 
  Integration Technology Integration


Analysis & Administration

 Analysis & Administration

About 8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimization and User Provisioning. The software solution - a product of Protected Networks - is developed in Germany. 



It redefines standards for professional network security and efficient user management and combines advanced functionalities with meeting current security and compliance regulations.