Managing Access Requests
Whether you are a business user or a security administrator, the
Access Request tool makes it far simpler to define and keep track
of your network access Requests. It uses Network Topology
Intelligence to help you populate the form and helps you re-use
common access requests. This improves communication between
business users and the security team, and increases the likehood
that the request will be implemented correctly. Once a task is
submitted, you can track the status of all of your requests
throughout the change lifecycle.
Automatic Verification and User Confirmation
SecureChange™ analyzes each completed ticket to verify whether
the request was handled successfully. Automatic verification speeds
request processing and minimizes the need to re-open tickets. Using
sophisticated security policy analysis technology, SecureChange
determines whether the design and scope of the change answer the
requirements - before the task is closed. In case of a discrepancy,
SecureChange sends an alert to the relevant handler.
Once the task is completed, the requestor is asked to confirm
that the original request was confirmed - and if the answer is no,
the task is reopened.
Effective IT Governance
Ticket verification is an important part of IT governance and
risk management that ensures that all policy configuration changes
correspond to an approved business need. Along with separation of
duties, enforced approvals and a comprehensive audit trail,
automatic ticket verification ensures that the change request
lifecycle is executed seamlessly.