8MAN is the IT access rights management of the future. Since 2009, Protected Networks GmbH has developed integrated Access Control solutions for access rights management in Windows and the virtual server environments of VMware vSphere for companies of all kinds. 8MAN technology ensures that the IT systems of companies, associations and public authorities becomes more secure by offering an easy to understand display of access rights on Active Directory, file servers, SharePoint, Exchange and vSphere. Based on our patented technology, 8MAN guarantees complete transparency and efficiency by means of information, documentation, delegation and administration of access rights and usage of company critical data. In this regard, concentrating on the essentials with a strong focus on customer needs are what differentiates the solution from other IT products in this segment. The technology and all of its parts are developed in-house in Berlin, in close co-operation with customers. 8MAN combines proven technology with 8MATE GrantMA, a web based workflow extension for access rights management. 8MATE GrantMA completes the integrated solution and provides employees with a self-service portal for ordering access rights that are then authorised and documented in an audit-proof manner.

Why 8MAN?

8MAN is innovation that stems from practical work

8MAN was created from customer requests. Our features and their implementation are based on the input of over 700 companies throughout the world. Requests for product extensions or improvements arise from practical work and flow directly into our regular updates. With a growing number of add-on modules, the 8MATES, you are optimally equipped for the future.

8MAN is stable, fast and light on resources

With its stable multilayer architecture, 8MAN can scan gigantic quantities of data in a short time. Therefore 8MAN is suitable for both small companies and for enterprise groups with a great number of users and file servers. 8MAN runs without a heavy demand on resources: The server load during operation is minimal.

8MAN builds on Microsoft best practice

If you modify file server rights in 8MAN, Active Directory groups are set up in the background to regulate and standardised access to resources. Therefore the assignment of rights follows Microsoft best practice. Users can move freely in the entire directory structure to the folder to which they have access rights. Since authorisations for individual folders are assigned directly, the user can see content immediately after, without having to log back in at his workstation. 8MAN can investigate active directory access rights permissions that have been set by administrators.

“The tool is so intuitive – I think you can show most people responsible for data how it works within ten minutes.”

Alexander Schanz

Deutsche Flugsicherung

8MAN is easy to use and secure

8MAN is easy to run and can be used immediately without a great deal of training, effort or expense. To make this possible, we use interfaces that can be customized to a specific role, reducing complexity and training required. Administrators see everything in 8MAN. You can reduce the views and capabilities of the 8MAN interface for the data owners and the help desk, depending on the role and the tasks assigned to them. That not only increases usability, it also raises the security level: You can simultaneously control both the persons who perform actions and the actions they can perform.

8MAN iSearch: Navigate and find quickly and easily

With 8MAN’s intelligent searching, you can search for objects from every view. Like search engines, 8MAN operates with auto-complete and immediately fills in results for users, groups, directories, contacts and the integrated resources.

8MAN Purpose Groups: And you can say what you really mean

In Active Directory, groups have technical names. Help people find their way and use meaningful names for groups.

“We use 8MAN at four German locations and also in Austria and the Czech Republic because it saves us time and money in the long run.”

Stefan Brüggemann

Head of Worldwide IT-Operations ATOTECH

8MAN is secure and efficient

Security and efficiency are essential opponents. With 8MAN you can analyse the permission situation in seconds and send reports automatically. Time-intensive processes in user provisioning can be completely standardised and sped up. By applying the concept of a data owner role, you ease the burden on administrators and give them time for more demanding projects. 8MAN can identify issues with role based access control using the 8MATE software.

Can't find what you're looking for?