Follow these guidelines to Improve traceability, monitor sensitive activities in business applications.
Not only VG2018 is expanding its feature set, it is also addressing GDPR requirements, by helping organizations making their business applications GDPR compliant.
VG 2018 can send email notifications when certain activities are detected. Alert administrators, controllers or managers when certain events occur.
Monitor sensitive activities in real-time: access to certain data, execution of certain business transactions, trigger of certain security events, etc.
Generate historical graphs to analyze business trends and detect possible issues.
Visualize the time when the user was or is connected to the application.
Get a complete list of permissions, for a given user, group, role or permission set.
You may wonder where a particular permission is coming from. Via which permission set(s) and role(s) was it granted?
VG 2018 natively supports configurations with multiple Active Directory.
VG 2018 includes a new search window to query Active Directory and declare Windows accounts or Windows Groups in your VG Repository.
With VG 2018, role propagation is optional.
VG 2018 introduces an optional simplification: Permission sets are no longer mandatory. If needed, you can directly grant permissions to roles.
VG 2018 provides additional features that help managing large numbers of user groups.
How to manage fined-grain permissions in your business applications
This document looks at identity management and access control (IAM) inside applications. It contains recommendations for those in charge of conceiving access control systems, organizing access rights and administering applicative security on the long term.
Governments around the world are promoting and standardizing the digitization of patient information in the health care sector... Specifically, we will look at how the United States has implemented certain regulations that obligate health care actors to add new features to their applications within a certain time frame; this requires a solution that meets standards across the board and is easy to implement even in existing applications
I think any developer will agree with me that adding security features to an application can be an absolute pain. [...] with Visual Guard from Novalys, the integration of security features is no longer a slog...
"Multi-tenant" and "Software as a service" applications are becoming more and more common. Companies are looking for different ways to manage their IT needs. They expect solutions that can adapt to their internal organizational structure and lower their deployment and maintenance costs. Multi-tenant applications allow just that – low cost and flexible architecture. However, multi-tenant applications also pose unique challenges. In this article, we will look at security administration and user management in a multi-tenant application with Visual Guard.
Code Project runs an annual reader survey, asking them to rate their favorite tools, in categories such as Reporting, Debugging, and SQL Database tools. These results, decided by a community of developers more than seven million strong, are based on real trials and in-the-field experience.
Visual Guard is thrilled to be in the company of tools from companies like Red Gate, Intel, and SAP.
See for yourself why Visual Guard was chosen “Best Authentication Tool”
How to simplify user management in your applications
In a 2002 NTA Monitor survey, it was found that the typical intensive computer user had, on average, 21 passwords. ... Password fatigue is the phenomenon of feeling overwhelmed by the need to remember all of them. To combat this, many users have found coping strategies. For example, they often create a list of passwords in a file, or even put them on post-its stuck to their terminals. All of this undermines the security policies that the passwords were created to enforce.
"This isn't a popularity contest. A product that earns a VSM Readers' Choice Award has earned the respect and loyalty, over time, of VSM readers, some of the most demanding users on the planet" Michael Desmond, Visual Studio Magazine editor in chief.
Members were asked to rate their favorites on tools. The Code Project staff then compiled the highest rated listings, awarding the highest ranked in each product category. The results reflect actual perceptions of what developers value. Each codeproject.com member decides which companies or products deserve recognition, based on in-the-field experience.
See how to control access to .NET applications reusing Windows accounts for authentication. Integrate with Active Directory and grant roles and permissions to Windows accounts. Define permissions without adding code thanks to .NET reflection mechanism.
Application security is such a problem that most developers prefer to ignore it. If ignoring it is impossible then we often implement a custom solution with user lists and passwords, or we simply expect the user control provided by the operating system to do the job [...] Visual Guard for .NET puts an end to this shoddy approach to security by making it trivial to implement and by providing good administration tools, and it works for both desktop applications and ASP.NET websites.
by Mike James
El reciente caso aparecido en la
televisión nacional, donde una factura recibida por un usuario
mostraba los apellidos de éste cambiados por palabras ofensivas,
ha puesto en evidencia una vez más la importancia de que las
aplicaciones a través de las cuales los empleados manipulan
los datos con que las empresas operan realicen una correcta autenticación
y registro de actividad de sus usuarios. Este mes presentamos Visual
Guard .NET, un cómodo y útil marco de trabajo que permite
gestionar de una manera eficiente y centralizada los usuarios, roles
y permisos de una aplicación y asegurar el acceso de los usuarios
a cada uno de los elementos de la misma...
by Octavio Hernández
Are you creating a security system for a SaaS application? Visual Guard is here to help! This article will list the important questions to ask during your project and the answers that Visual Guard provides to avoid security breaches or functional limitations that will hold you back