TABLE OF CONTENTS:
• General Product Functionality
• Automating Compliance Requirements and Reporting
• Automating Security Administration
Policy Minder enables you to improve system security without adding time-consuming, manual tasks to your workload. Use this checklist to see how your current solution compares.
GENERAL PRODUCT FUNCTIONALITY | Others | Policy Minder |
Security policies can be defined for security administration or compliance requirements | ✓ | |
Discover the existing policy and use it as the initial policy setting | ✓ | |
Compliance checks compare policies to actual server settings | ✓ | |
Return out-of-compliant items to match policy values | ✓ | |
Security configuration can be applied to multiple servers or customized for each one | ✓ | |
Exception-based reports enhance efficiency | ✓ | |
Email reports automatically | ✓ | |
Document policies, compensating controls, and risk acceptance statements | ✓ | |
Manage security policies and compliance with policies on multiple systems via a single screen | ✓ | |
Comprehensive message log tracks administration and activity | ✓ | |
Supports systems both on-premises and in the cloud | ✓ |
AUTOMATING COMPLIANCE REQUIREMENTS AND REPORTING | Others | Policy Minder |
Eliminate manual process of running reports, downloading information, and manually comparing lists to determine compliance or identify new items added to the list | ✓ | |
Ensure consistent, accurate, and repeatable tasks that prove compliance | ✓ | |
Report on out-of-compliance items and the fact that the policy is checked regularly | ✓ | |
FixIt reports indicate how changes were made and what the previous values were | ✓ | |
Ensure administrator tasks and reporting are accomplished regardless of how busy administrators are | ✓ | |
Keep your security policies in one place and apply them to other partitions | ✓ |
AUTOMATING SECURITY ADMINISTRATION | Others | Policy Minder |
Discover new profiles, libraries, directories and objects | ✓ | |
Maintain and identify all users with any special authority | ✓ | |
Ensure user profiles are properly configured and correct them if they are not | ✓ | |
Identify inactive profiles and remove them from the system | ✓ | |
Ensure the ownership and authorities of libraries and objects in libraries are set correctly | ✓ | |
Discover changes to authority settings on libraries, directories, objects and authorization lists | ✓ | |
Fix ownership and authorities after a new deployment | ✓ | |
Verify settings before and after a role swap, or following disaster recovery | ✓ | |
Identify new or removed file shares | ✓ | |
Discover changes to system values or where they don’t match policy | ✓ | |
Let's Get Started
See Policy Minder in action to determine how it can help you meet your cybersecurity goals.
REQUEST MY FREE DEMO