total Access control

Security 4X Modules
ATTAIN INSIGHT SECURITY 4X
  • Home
  • About S4X
  • Use Cases
    • Compliance & Auditing
    • GDPR
    • Enterprise Security & Automation
    • Password Management
    • Report Security & Data Governance
    • Securing Access by User and Groups
    • TM1 Security
  • Contact

Robust control and security over your business analytics platform

SECURITY 4X OFFERS:
  • Centralized access to create and manage security policies for content, data, and metrics
  • Compliance reporting and full audit trail of all changes to BI security
  • A modular approach for ease of policy management such as; data security, audit, content security, and license management
  • The confidence and ability to create SLAs for both IT and Business based on predictable scheduled updates to production environments
  • A consistent methodology for the implementation of complex security initiatives — ensuring policy consistency across multiple environments, such as Development, QA, and Production
  • Membership management delegation by business users
Picture
Download Brochure

Streamline and Automate Security Administration and User-Access Control Processes

Security implementations are time consuming, difficult and error prone.  Even small security deployments involve multiple application instances and environments, and thousands of granular security rules. Security 4X simplifies all this and ensures that information is accessible only to those authorized, and that all changes to security are tracked, leaving you with a low overhead solution fully compliant with IT and industry standards across all environments and application instances (including standards such as ITIL, ISO/IEC 27002, NIST 800-53r4 and ITSG-33 Annex 4a)

5 Security 4X Control Modules

Content Security

S4X Content Security
This comprehensive role based solution secures folders, reports, data connections and many other objects within IBM Cognos applications. Content Security also ensures that IT and Cognos Administrators can apply security consistently across all areas of IBM Cognos with complete audit and compliance reporting capabilities to validate consistency.  Designed to fully support automation so security updates, validation checks, and refreshes can all be scheduled.

Data Security

S4X Data Security
This add-on to Content Security provides data level security on tables, query items, and other Framework Manager objects, as well as support for dimensional sources such as PowerPlay Cubes and TM1. This module allows customers to use any number of business hierarchies to define the Enterprise Security Model, saving extensive time and effort by handling complexity with ease. A fully automated Enterprise Security Model can be designed and implemented across all IBM Cognos software components (and all environments) in just hours.

WebGrant: Group Membership Administration

Picture
Provisioning and de-provisioning users is one of the biggest organizational costs to worker productivity (see NIST study of large organizations). Security 4X WebGrant is a web-based administration portal that significantly reduces IT workload by allowing business administrators to independently add and remove users from groups and delegate authority.  It also comes with its own reporting package to provide visibility and traceability on all membership changes.

Authorized User & Password Management

Picture
An enterprise solution governing authorized user access to applications with business delegation to reduce IT workload. Ideal for named user license management, it also includes expiry notice management, business side account locking/enablement, and standardized sign-ons. Manage user access lifecycle from enablement, through password changes (including certificates or other multi-factor authentication methods) using customizable email templates with end-user choice of language. Note: Directory server synchronization and full access lifecycle audit and compliance reports are included.

Audit and Compliance Reporting

Picture
For organizations that want comprehensive access control audit and compliance reporting across their analytic applications, or who are concerned about duplicate identities, access privilege risks introduced by role changes, or help desk errors, this module provides identity resolution capabilities with options for customized workflow and risk processing logic to ensure high integrity identity assurance as well as conditional, dynamic or situational access control.

Need an infographic to explain it?

Picture

SEE IT. BELIEVE IT.

    Request a demonstration

Submit

Company

Picture
Picture

What Our Clients Are Saying

"Since 2012, we have been using it and it has really accelerated the process of building the security especially with the smart policy management. It has also simplified a lot of local administration, and now all 15 of our admins are managing security access for their own user community areas,” commented Raphael Labis, Veolia’s BI reporting manager, Corporate IT, BI Reporting.

Connect with Us
+1-833-235-0200

    Subscribe to news & events!

Submit
  • Home
  • About S4X
  • Use Cases
    • Compliance & Auditing
    • GDPR
    • Enterprise Security & Automation
    • Password Management
    • Report Security & Data Governance
    • Securing Access by User and Groups
    • TM1 Security
  • Contact