TABLE OF CONTENTS:
• General Product Functionality
• Automating Compliance Requirements and Reporting
• Automating Security Administration
Policy Minder enables you to improve system security without adding time-consuming, manual tasks to your workload. Use this checklist to see how your current solution compares.
| GENERAL PRODUCT FUNCTIONALITY | Others | Policy Minder |
| Security policies can be defined for security administration or compliance requirements | ✓ | |
| Discover the existing policy and use it as the initial policy setting | ✓ | |
| Compliance checks compare policies to actual server settings | ✓ | |
| Return out-of-compliant items to match policy values | ✓ | |
| Security configuration can be applied to multiple servers or customized for each one | ✓ | |
| Exception-based reports enhance efficiency | ✓ | |
| Email reports automatically | ✓ | |
| Document policies, compensating controls, and risk acceptance statements | ✓ | |
| Manage security policies and compliance with policies on multiple systems via a single screen | ✓ | |
| Comprehensive message log tracks administration and activity | ✓ | |
| Supports systems both on-premises and in the cloud | ✓ | |
| AUTOMATING COMPLIANCE REQUIREMENTS AND REPORTING | Others | Policy Minder |
| Eliminate manual process of running reports, downloading information, and manually comparing lists to determine compliance or identify new items added to the list | ✓ | |
| Ensure consistent, accurate, and repeatable tasks that prove compliance | ✓ | |
| Report on out-of-compliance items and the fact that the policy is checked regularly | ✓ | |
| FixIt reports indicate how changes were made and what the previous values were | ✓ | |
| Ensure administrator tasks and reporting are accomplished regardless of how busy administrators are | ✓ | |
| Keep your security policies in one place and apply them to other partitions | ✓ | |
| AUTOMATING SECURITY ADMINISTRATION | Others | Policy Minder |
| Discover new profiles, libraries, directories and objects | ✓ | |
| Maintain and identify all users with any special authority | ✓ | |
| Ensure user profiles are properly configured and correct them if they are not | ✓ | |
| Identify inactive profiles and remove them from the system | ✓ | |
| Ensure the ownership and authorities of libraries and objects in libraries are set correctly | ✓ | |
| Discover changes to authority settings on libraries, directories, objects and authorization lists | ✓ | |
| Fix ownership and authorities after a new deployment | ✓ | |
| Verify settings before and after a role swap, or following disaster recovery | ✓ | |
| Identify new or removed file shares | ✓ | |
| Discover changes to system values or where they don’t match policy | ✓ | |
Let's Get Started
See Policy Minder in action to determine how it can help you meet your cybersecurity goals.
REQUEST MY FREE DEMO