Skip to content
English
  • There are no suggestions because the search field is empty.

Gathid’s Map it, Measure it, Monitor it! Methodology

Gathid is a lightweight analytics and compliance tool that delivers value within just days. The product provides the following key functionality:

  • Visualizes access across multiple systems
  • Identifies access rights that are in (potential) breach with security, safety and compliance policies
  • Streamlines the access attestation process

Gathid is deployed to your single-instance GCP virtual machine. 

Once installed, Gathid is able to process daily feeds from relevant systems such as HR system(s), Active Directory, contractor management systems, access control system(s), learning management, and any other system that contains information to consider when determining whether or not a person should have access rights to a certain system or location. It even supports multiple instances of your identity sources such as Active Directory / Okta and HR systems.

Gathid does not require a developed API integration with those other systems. It simply requires a file, ideally provided at a daily frequency or as close to, containing user access information in the form of a CSV or other supported format.

With your data now at your fingertips in standard or custom dashboards daily, data cleansing can be done daily,

With Gathid, access reviews are made easy through our Map it, Measure it, Monitor it methodology.

Map it

When collecting new system data, Gathid discovers what to look for in the data and builds a map showing how collected data entities connect to other entities, both within that system and other systems in your Gathid instance.

Gathid correlates interrelated information and visualizes who has what access across multiple systems. Using graph database technology, it builds multi-layer access views to quickly understand the roles and types of access a given person has within the organization. 

Measure it

Gathid can also identify access rights that have been assigned but that are in breach of an organization’s security, safety or compliance policies.

The system can identify and flag people that are no longer active in the source system but still show one or more active user records. If your safety policy requires a certain set of training and certifications before being allowed into the Data Center, the product will flag any individuals that have Data Center access but miss those qualifications.

An action can be triggered to remove access rights from a flagged person using an organization’s existing processes. The next day the same automated checks will run again to verify that corrective actions were executed correctly in your source systems.

Monitor it

Gathid also streamlines the access attestation process. Many systems fall victim to access accumulation. People receive certain access rights either directly or via a security group for specific business reasons, but those access rights rarely get reassessed.

Using notifications sent when certain benchmarks have been met in daily reports, or possibly an access review required for compliance, Gathid can highlight results to be monitored. Going further, Gathid delivers additional contextual information (from other related entities) to allow the responsible/accountable parties to make informed, efficient decisions as to whether the access is appropriate and take action in alignment with existing company procedure as necessary.

Leveraging contextual information when monitoring access not only reduces the risk of inappropriate access, but also provides the organization with a complete audit trail in support of internal or external audits.        

NEXT UP

What is the Customer Journey for Gathid?