Why protect only 20% of your data? Numerous research studies have found that over 80% of organizational information resides in unstructured data formats, including Excel spreadsheets, PDF files and documents containing credit card numbers, personally identifying information, intellectual property and financial data stored in Windows® share files, file systems and SharePoint® farms.

Many organizations have invested heavily in Identity and Access Management (IAM) solutions to manage access to applications and systems. However, these solutions do not extend the data governance processes to unstructured data, leaving a significant compliance gap. With the Tangentia Governance of Unstructured Data (TGUD) Module for IBM®'s Security Identity Manager (ISIM), organizations that are using or thinking of choosing IBM’s IAM solution can now extend the existing product features to include the governance of unstructured data.

The TGUD module utilizes the industry leading Data Access Analyser to collect rich information as to who has access to what files and additionally provides additional risk analysis that may be viewed and reported from the ISIM interface.

TGUD provides the ability to configure the scope of information collected, such as from which domains, file servers and users. The collected data from the crawler is extracted and normalized to the ISIM data schema so that users and administrators of ISIM can execute familiar tasks from one familiar user interface. The data collected appears to ISIM as another service component.

Business information

Show all   |   Hide all

  • Functional details

    Collect detailed share, folder and SharePoint® entitlements

    Reconcile data based on domain, server, path, user and sensitive information filters

    View inventory of user access: applications, systems and unstructured data

    Recertify user unstructured data entitlements for over-provisioning, unused permissions, open file shares

    Conduct checks on Separation of Duties and exemptions

    Report on unstructured data entitlements

  • Competitive advantage

    Leverage existing investments in ISIM and maintain consistent processes to manage access governance of applications, systems and unstructured data.

    Run existing entitlement certification processes to include file shares, servers and Sharepoint® sites.

    Determine who has access and entitlements to file shares, servers, and Sharepoint sites and if the access profile is appropriate.

    Improve your organization security posture by having proper information in a single view in order to make appropriate decisions.

    Meet compliance objectives by preventing access policy conflicts through separation of duty checking and enforcement, and by providing auditable evidence on unstructured data.

    Detect permission changes and take appropriate actions to ensure non-compliant access.

  • Industries

    Banking Industry
    Financial Markets Industry
    Government Central/Federal industry
    Healthcare Industry
    Insurance Industry

  • Solution areas

    Financial Services/Banking
       Regulatory Compliance
    Healthcare and Pharmaceutical
    Cross industry
       Surveillance and security
          Governance, Risk and Compliance
          Identity and Access Management
       System and data management
          Data Protection and Recovery

  • Customer size

    Midmarket Business (100 to 499 employees)
    Midmarket Business (500 to 1000 employees)
    Large Business (greater than 1000 employees)

  • Languages supported


  • Countries/regions available for distribution

    Canada , United States

Technical information

Show all   |   Hide all

  • Hardware/OS platforms

    AIX 7.1
       IBM Systems: Power
       IBM PureSystems: PureFlex System and Flex System

  • Services

    IBM Application Security Services
    IBM Infrastructure Security Service Threat Mitigation - Express multi-function security bundle
    IBM Infrastructure Security Services - Express managed multi-function security bundle
    IBM Infrastructure Security Services Threat Mitigation Services - IBM Virtual Server Security for VMWare

  • Storage devices

    Network Attached Storage
       IBM System Storage N5000 Gateway
       IBM System Storage N5200
       IBM System Storage N5300
       IBM System Storage N5600

Date last modified:    Feb 14, 2017


Contact information

Vijay Thomas
416 346-7942


Tangentia Inc
4789 Yonge Street
Suite 620
Toronto, Ontario M2N 0G3

+1 416 2387515

Contact PartnerWorld

Live Chat is currently unavailable

The live chat service is normally available weekdays 8am-8pm Eastern Time. Use the 'Contact us' link or one of the other links for help now.