Redstor UAM end-user brochure
The RedApp, Redstor’s app for smart data management and protection, has been specifically designed for granular, configurable Identity and Access Management. This enables you to:
Set up strong security Protect against data breaches, identity theft and forbidden access to confidential information. Prohibit the spread of compromised login credentials. Block unauthorised entry to your organisation’s network. Bolster your defences against ransomware, hacking, phishing, and other cyber-attacks.
Streamline IT workloads
Update a security policy easily and comprehensively. Change all access privileges across your organisation in one action and save IT time by automating more tedious tasks e.g. password reset requests.
Comply with regulations
Quickly implement IAM best practices to meet the requirements of industry regulations e.g. Health Insurance Portability and Accountability Act and General Data Protection Regulation.
Enable secure collaboration with third parties
Achieve greater productivity by giving external parties (customers, suppliers, and visitors) access to your network without jeopardising security.
Simplify user experience
Free users from having to remember and enter numerous, complex passwords. With tighter IAM control, you can allow them to access multiple systems under Single Sign On and make use of biometrics or smart cards.
If your data is spread over many sites or multiple regions, but you wish to delegate permissions to regional offices, you can restrict and allow access accordingly. To avoid any risk of unwanted deletions, roles can also be customised in the RedApp to remove the ability to delete accounts and data. By delivering greater control of user accounts, Redstor’s UAM avoids having to divide up an estate and assign admins with more access than is deemed secure. Administrators can lock down specific users if an employee leaves the organisation or a login is compromised. The introduction of mandatory 2FA using the more secure TOTP (time-based, one-time password) method also protects against malicious activity.
Administrators can choose from a wide variety of roles depending upon their access needs and can customise the granular permissions of each role for customers and products.
Administrators have an audit trail of who uses the platform with respective roles and actions. They can also manage users in bulk if required and obtain insight into user activity.
Easily enable the right person to take swift, comprehensive action in the event of human error, malicious activity or cyber-attack, while avoiding alerting an attacker or creating internal confusion.