Manage your organisation's information access controls and minimise the risk of license overruns

Fastman provides the tools and expertise you need to trust your OpenText Content Suite / SAP Extended ECM information.

Managing information access controls in a safe and cost-effective manner is challenging


  • Concerned about not being able to control access permissions.
  • Frustrated that you cannot manage exactly what functions specific users can and can not perform.
  • Annoyed by the time it takes to uncover which users most frequently attempt to perform prohibited actions.
  • Worried that you might receive an unexpected license payment demand.

No more penalties and fines

Fastman Access Manager stops users from acting out of their licence bounds, preventing expensive penalties and fines. With Fastman Access Manager, you’ll never have to worry about audits anymore.

Ensure read-only licence compliance
Customise and optimise your licence usage

Manage exactly what functions your users can perform

It’s your data, it’s your choice. By using a simple administration interface, Fastman Access Manager allows your system admins to manage exactly what functions your users can and can not perform. This list can be readily tailored and customised to enforce strict belt and braces compliance, or can be lifted for individuals.

Optimise full-user license usage

With Fastman Access Manager, you can audit all functions used by any read-only user and quickly uncover which users most frequently attempt to perform prohibited actions. With this information you can add or move existing licences, optimising full-user licences.

Manage your internal access with audits

Off-the-shelf, operational within an hour

As an easy to configure Content Suite module, Fastman Access Manager requires minimal professional services or supplementary development effort. It is fast to deploy, more robust and more cost-effective than any alternative option.

It's time to trust your information…


1. Arrange a meeting

We will highlight potential information security threats enabling you to address them before they become a risk.


2. Take control

Implement a set of simple recommendations designed to ensure the security of your information.


3. Trust your content

Use your information with confidence knowing that it is managed in an effective and compliant manner.

Download Data Sheet