Redundant monitoring in access management
Sensitive data with peace of mind
Following the need-to-know principle, a user should only receive as many permissions as they require to fulfill their current tasks. In practice, however, more and more extensive permissions accumulate over time, although most may no longer be needed. Existing permission systems may not even allow a clear delineation of permissions – or they over-simplify to reduce the manual maintenance required. The Access Manager closes the gap between the seemingly contradictory objectives of ensuring data security while keeping maintenance low.