Skip to content

Strategy Blocks: Strategy Planning & Execution and Executive Business Performance Dashboards

Content access, data protection and compliance

Security 4X is a centralized security administration and compliance management solution, purpose-built to handle complex enterprise security requirements across the full suite of IBM Business Analytics products including IBM Cognos Analytics, Planning Analytics, Framework Manager, TM1, Transformer …and other products that use LDAP or Microsoft Active Directory.

Security 4x Offers:

  • Centralized access to create and manage security policies for content, data, and metrics
  • Compliance reporting and full audit trail of all changes to BI security
  • A modular approach for ease of policy management such as; data security, audit, content security, and license management
  • Membership management delegation by business users
  • A consistent methodology for the implementation of complex security initiatives across multiple environments, such as Development, QA, and Production
  • Software license compliance, utilization and optimization reporting

Streamline and Automate Security Administration and User-Access Control Processes

Security implementations are time consuming, difficult and error prone. Even small security deployments involve multiple application instances and environments, and thousands of granular security rules. Security 4X simplifies all this and ensures that information is accessible only to those authorized, and that all changes to security are tracked, leaving you with a low overhead solution fully compliant with IT and industry standards across all environments and application instances (including standards such as ITIL, ISO/IEC 27002, NIST 800-53r4 and ITSG-33 Annex 4a)

5 Security 4X Control Modules

Content Security

This comprehensive role based solution secures folders, reports, data connections and many other objects within IBM Cognos applications. Content Security also ensures that IT and Cognos Administrators can apply security consistently across all areas of IBM Cognos with complete audit and compliance reporting capabilities to validate consistency. Designed to fully support automation so security updates, validation checks, and refreshes can all be scheduled.

Data Security

This add-on to Content Security offers Cognos schema level data security, including support for Cognos Data Modules and Cognos Framework Manager. It's powerful dimensional security capabilities make it possible for security rules to be standardized across multiple distributed sources such as PowerPlay Transformer Cubes and TM1 Servers, allowing customers to use any number of business hierarchies or schemas ... saving extensive amounts of time and effort.

Audit and Compliance Reporting

For organizations that want comprehensive access control audit and compliance reporting across their analytic applications, or who are concerned about duplicate identities, access privilege risks introduced by role changes, or help desk errors, this module provides identity resolution capabilities with options for customized workflow and risk processing logic to ensure high integrity identity assurance as well as conditional, dynamic or situational access control. Built-in reporting also makes this a beneficial module for license compliance assurance.

WebGrant: Group Membership Administration

Provisioning and de-provisioning users is one of the biggest organizational costs to worker productivity (see NIST study of large organizations). Security 4X WebGrant is a web-based administration portal that significantly reduces IT workload by allowing business administrators to independently add and remove users from groups and delegate authority. It also comes with its own reporting package to provide visibility and traceability on all membership changes.

Authorized User & Password Management

An enterprise solution governing authorized user access to applications with business delegation to reduce IT workload. Ideal for named user license management, it also includes expiry notice management, business side account locking/enablement, and standardized sign-ons. Manage user access lifecycle from enablement, through password changes (including certificates or other multi-factor authentication methods) using customizable email templates with end-user choice of language. Note: Directory server synchronization and full access lifecycle audit and compliance reports are included.

Best Use Cases

Authorized User, Password Management and Compliance

A government department with 1,600+ IBM Cognos users, requires password changes multiple times a year. See how a cumbersome manual process for IT, can now be owned-and-managed by the business, with the confidence security standards are being met.

Securing Access by User and Groups

Governed by strict privacy regulations a healthcare department struggled to apply security rules across all Cognos software components, environments and user-groups. Learn how Security 4X managed it all and provided external security for ‘Parallel Mapped’ groups with full audit reporting on all add/remove user actions.

Scaleable Security, Compliance and Auditing

A genome company could no longer manually administer security growing to 2,000 locations and 8,000 memberships, each requiring its own security against Cognos data. See what it took secure, scale, and provide compliance audit information on-demand and in real-time.

Enterprise Security & Automation

A major eye care company needed role appropriate privileges for thousands to access sales data delivered through Cognos. Find out how they secured models, automated processes, and assured membership data was synchronized with security within their ERP system

Report Security & Data Governance

An electronics manufacturer sought to implement security at a more granular level across all of their relational reporting with 2,500 distinct security policies. See how in just one day Security 4X provided immediate results, reducing administrative burden by 90%!

Simplifying TM1 Security

Learn how a Canadian Crown Corporation streamlined security configuration tasks across the entire TM1 environment, enabling BI administrators to confidently and securely deploy TM1 applications.

What Our Customers Have to Say