Fastman provides the tools and expertise you need to trust your OpenText Content Suite / SAP Extended ECM information
If you are serious about managing security and access within your Content Suite or Extended ECM platform, Permissions Manager is an essential component to your implementation.
It provides critical capabilities that enable administrators and power-users to quickly identify, address, and avoid information leaks. Permissions Manager is the brains behind all sound internal information control solutions.
Security breaches are an unfortunate reality in the modern connected world. Whether that risk comes from external or internal sources, any weaknesses must be addressed quickly and with confidence.
Permissions Manager exposes often unseen and unrecognized information access risks. Its concise dashboards provide administrators and management with a detailed overview that outlines current access rights and flags unusual or anomalous permission settings.
Through its decentralized approach, Permissions Manager enables business users to retain control of their own data.
The simple and easy to use tools it provides enable individual users to view and take action on permissions, including applying approved access templates. Business teams no longer need to turn to IT or the service desk to perform basic tasks.
Permissions Manager also provides a comprehensive set of usage controls. From specific functions, down to individual users, it allows administrators to define exactly what can be done and by whom.
Permissions Manager makes the complex simple. The ability to view information on individual folders, across collections of content, or throughout the whole repository makes complex information security structures manageable.
Permissions Manager also provides permissions roll-back, search, and detailed audit logs that deliver a level of control far beyond those available in the standard Content Suite or Extended ECM.
Implementing Fastman Permissions Manager requires no professional services or supplementary development effort. It is fully supported, installs out-of-the-box, can be operational in hours, and is proven with organisations around the world.
We will highlight potential information security threats enabling you to address them before they become a risk.
Implement a set of simple recommendations designed to ensure the security of your information.
Use your information with confidence knowing that it is managed in an effective and compliant manner.