What Problems Does Welle Solve¶
Right Person, Right Access, Right Time
A typical life-cycle of an employee involves the
- When an employee joins a company, she is granted access to Microsoft Exchange and Microsoft Active Directory. Since she is hired as a database administrator, she is also granted access to Microsoft SQL server and MySQL server.
- After joining the company for a month, she needs to collaborate with her colleagues for a new project. Thus she requests access to Microsoft SharePoint. Her manager approves her access.
- 2 years after she started work, she changes her job scope. She is now a systems administrator.
- All her previous accesses to databases and Microsoft SharePoint are revoked. Her access to Microsoft Exchange and Microsoft Active Directory remains for her day-to-day communication.
- She is now granted access to Linux and Windows servers.
- Finally, she decides she wants a change of environment. She quits.
- On her last day, all her accesses are revoked.
The above illustration of an employee life-cycle can be automated by Identity Management software. This process is commonly known as Provisioning.
In most organizations, on an annual basis, IT auditors request IT departments to provide them with most recent lists of all systems and user accounts. The auditors will flag out an audit fault if any orphan or dormant account is found on any system.
Orphan Account is an account belonging to a user who has since left the organization, while a
Dormant Account is an account which has not had any login activity for an extended period of time.
Therefore, most IT departments will require managers to perform access review on their direct reports prior to annual audit reviews.
IT departments might also ask application owners to review all accounts in their applications.
Failing to perform user access reviews on a regular basis will place the organization at a higher risk for:
- A resigned employee gaining remote access to the network or email system
- Segregation of duties issues if an employee moves to a new department, but retains system privileges from the previous department
- Misuse of dormant administrative accounts that are still active
- System compromise through the use of contractor/vendor passwords that never expire
The above illustration of a user access review can be automated by Identity Governance software. This process is commonly known as Governance.
Common Pain Points¶
- Ineffective and Inefficient Manual Work Orders
- Repeated Process for Multiple Applications
- Unable to Meet SLA and Compliance Requirements
- Un-Tracked Toxic Access Combinations
- Tediously Manual Compiled Access Reviews
Welle is the next generation Access Review engine, which helps support enterprise IT security and regulatory compliance. You can manage the identity life-cycle in your organization in a secure and convenient portal.
Welle brings the following benefits to our customers:
- Automated User Lifecycle Management
- Audit and Security
- User Self-Service
- To identify Orphan or Dormant Accounts
- Access Review
- Audit and Reports
- Segregation of Duties