•   SUPPORT +49 89 420447-30
  •   This email address is being protected from spambots. You need JavaScript enabled to view it.   |
  •   SALES +49 89 420447-20
  •   This email address is being protected from spambots. You need JavaScript enabled to view it.

8MAN Logo Small C8MAN

Modern Access Rights Management

8MAN Access Rights Management

Why 8MAN?

8MAN is innovation that stems from practical work

8MAN was created from customer requests. The features and their implementation are based on the input of over 700 companies throughout the world. Requests for product extensions or improvements arise from practical work and flow directly into regular updates.
With a growing number of add-on modules, the 8MATES, you are optimally equipped for the future.  

8MAN is stable, fast and light on resources

With its stable multilayer architecture, 8MAN can scan gigantic quantities of data in a short time. Therefore 8MAN is suitable for both small companies and for enterprise groups with a great number of users and file servers. 8MAN runs without a heavy demand on resources: The server load during operation is minimal.

8MAN builds on Microsoft best practice

If you modify file server rights in 8MAN, Active Directory groups are set up in the background to regulate and standardized access to resources. Therefore the assignment of rights follows Microsoft best practice. Users can move freely in the entire directory structure to the folder to which they have access rights. Since authorizations for individual folders are assigned directly, the user can see content immediately after, without having to log back in at his work station.  

8MAN is easy to use and secure

8MAN is easy to run and can be used immediately without a great deal of training, effort or expense. To make this possible, we use interfaces that can be customized to a specific role, reducing complexity and training required. Administrators see everything in 8MAN. You can reduce the views and capabilities of the 8MAN interface for the data owners and the help desk, depending on the role and the tasks assigned to them. That not only increases usability, it also raises the security level: You can simultaneously control both the persons who perform actions and the actions they can perform.

8MAN iSearch: Navigate and find quickly and easily

With 8MAN's intelligent searching, you can search for objects from every view. Like search engines, 8MAN operates with auto-complete and immediately fills in results for users, groups, directories, contacts and the integrated resources.

8MAN Purpose Groups: And you can say what you really mean

In Active Directory, groups have technical names. Help people find their way and use meaningful names for groups.

8MAN is security and efficiency

Security and efficiency are essentially opponents. 8MAN breaks down this antagonism. With 8MAN you can analyze the permission situation in seconds and send reports automatically. Time-intensive processes in user provisioning can be completely standardized and sped up. By applying the concept of a data owner role, you ease the burden on administrators and give them time for more demanding projects.


About 8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimization and User Provisioning. The software solution - a product of Protected Networks - is developed in Germany. It redefines standards for professional network security and efficient user management and combines advanced functionalities with meeting current security and compliance regulations.

8MAN Disciplins

Our Philosophy

Our goal is to assist you in solving specific security problems on the Internet, IT networks and in telecommunications.

We achieve this goal by the quality and actuality of our security products, as well as competence and commitment of our team.

Contact Options

Contact Sales (inquiries,
licenses, orders, ...)
  • +49 89 420447-20
  • This email address is being protected from spambots. You need JavaScript enabled to view it.
Contact Support (settings, ...)
  • +49 89 420447-30
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Company Details

CyProtect AG - Internet Security

 

Address
Schatzbogen 58
81829 Munich
Germany
Facsimile
  • +49 89 420447 79

Contact Form

Email:
Subject:
Message:
How many hours are in a day?