Robust control and security over your business analytics platform
SECURITY 4X OFFERS:
|
Streamline and Automate Security Administration and User-Access Control Processes
|
Security implementations are time consuming, difficult and error prone. Even small security deployments involve multiple application instances and environments, and thousands of granular security rules. Security 4X simplifies all this and ensures that information is accessible only to those authorized, and that all changes to security are tracked, leaving you with a low overhead solution fully compliant with IT and industry standards across all environments and application instances (including standards such as ITIL, ISO/IEC 27002, NIST 800-53r4 and ITSG-33 Annex 4a)
|
5 Security 4X Control Modules
Content Security![]() This comprehensive role based solution secures folders, reports, data connections and many other objects within IBM Cognos applications. Content Security also ensures that IT and Cognos Administrators can apply security consistently across all areas of IBM Cognos with complete audit and compliance reporting capabilities to validate consistency. Designed to fully support automation so security updates, validation checks, and refreshes can all be scheduled.
Data Security![]() This add-on to Content Security provides data level security on tables, query items, and other Framework Manager objects, as well as support for dimensional sources such as PowerPlay Cubes and TM1. This module allows customers to use any number of business hierarchies to define the Enterprise Security Model, saving extensive time and effort by handling complexity with ease. A fully automated Enterprise Security Model can be designed and implemented across all IBM Cognos software components (and all environments) in just hours.
|
WebGrant: Group Membership Administration
![]() Provisioning and de-provisioning users is one of the biggest organizational costs to worker productivity (see NIST study of large organizations). Security 4X WebGrant is a web-based administration portal that significantly reduces IT workload by allowing business administrators to independently add and remove users from groups and delegate authority. It also comes with its own reporting package to provide visibility and traceability on all membership changes.
Authorized User & Password Management
![]() An enterprise solution governing authorized user access to applications with business delegation to reduce IT workload. Ideal for named user license management, it also includes expiry notice management, business side account locking/enablement, and standardized sign-ons. Manage user access lifecycle from enablement, through password changes (including certificates or other multi-factor authentication methods) using customizable email templates with end-user choice of language. Note: Directory server synchronization and full access lifecycle audit and compliance reports are included.
|
Audit and Compliance Reporting

For organizations that want comprehensive access control audit and compliance reporting across their analytic applications, or who are concerned about duplicate identities, access privilege risks introduced by role changes, or help desk errors, this module provides identity resolution capabilities with options for customized workflow and risk processing logic to ensure high integrity identity assurance as well as conditional, dynamic or situational access control.