How Torsion Works

How Torsion Works

Torsion makes sure your employees have exactly the information they need, exactly when they need it - completely automatically.

Accurate need-to-know access controls to proactively combat the insider security threat.

And Torsion makes clear exactly who has access to what, and the business reasons why they have it - across all the systems where your information is stored.

Clear access visibility and reporting to streamline regulatory compliance.

Torsion’s central engine is located either in the cloud or your data centre. After you configure connections to your information systems, Torsion gets to work immediately.

Giving you visibility and reporting across the entire information estate. Unifying and automating the security configurations, within your information governance policy. And gently enlisting the support of business information owners to guide the security configuration for their own data.

So Torsion will always be in the right place at the right time to provide you with automated, cross-platform, information access control and reporting.

Torsion need-to-know access policies secure your information
Torsion makes it clear why people need access to information

Torsion makes it clear why people need access to information

Torsion makes it clear why people need access to information

Torsion supports information sharing based on why people should access to information, not just who should have access.

Torsion’s simple business rules and classification labels are based on your security model, and change as your business grows and adapts.

So your access controls always remain clear, consistent and reliable.

Torsion makes access controls clear and visible to you

Torsion makes access controls clear and visible to you

Torsion makes access controls clear and visible to you

Just as important as controlling access, is knowing who has it.

Once Torsion has established why people have access to information, it will show you the relevant combination of live business circumstances that give employees access to any piece of information.

So people working in a folder, as well as the information owners will see who has access to it.

So everyone has clarity and consistency, and you can have confidence.

Torsion keeps it simple as your business grows more complex

Torsion keeps it simple as your business grows more complex

As your company grows, its systems, processes and information come more difficult to manage.

Torsion keeps everyone’s access to information accurate and updated automatically.

So it doesn’t add to your workload, just to your peace of mind.

Lets consider an example...

Lets consider an example...

This Engineering Manager moved from New York to London to head up the London Engineering Department. But she will still work for the ‘New York Engineering Bid Team’ and the ‘Chicago Engineering Steering Group’ remotely from London.

So how will Torsion deal with the complexity of permissions access to ensure she has everything she needs and nothing extraneous?

Firstly, the HR Team managing office locations simply change her Location attribute, and add that she will continue to work on the ‘New York Engineering Bid Team’ and on the ‘Chicago Engineering ABC Account’.

Add Additional Capacity

Torsion will do the rest. Automatically updating all information access controls, reliably ensuring she now has access only to that she needs in her new location and access to what she needs across the pond:

  • Torsion will automatically change her access controls for the 'London office' and for the 'Managers and Directors of London'.
  • It will grant access to the various File Shares secured for the ‘New York Engineering Bid Team’ and the ‘Chicago Engineering ABC Account’.
  • It will also deny access to the SharePoint Library secured for ‘Managers and Directors in New York or Chicago’.
  • And it will prevent her access to the thousands of documents scattered in Google Drive secured for ‘USA Managers’.

Senior _Managers _etc

She has everything she needs to be in control of her new role, and you have everything in place safely and securely.

Job done.

 

 

Controlling insider risk, automatically

Follow us on TwitterFollow us on Twitter See our profile on LinkedInSee our profile on LinkedIn Like us on FacebookLike us on Facebook