Is your Business Objects XI R2 Deployment SOX Compliant?
Be SOX compliant, choose 360R2
360View R2 puts you in full control of your security, focus on your Business Intelligence strategy and reporting, stop wasting time managing users, content and rights. Save more than 60% of your administration time!
Be sure to put the right information in the right hands. Thanks to 360View's powerful interface you get a perfect view of your deployed environment, there is no room left for uncertainty. Be SOX and BASEL compliant. Document and audit every single element of your repository: from reports to SQL restrictions, from universes to connection definition. All the information you need, is now available.
Security Configuration Made Easy
Manage content and actors using a hierarchical perspective, similar to the previous Supervisor module, for clearer visibility and more intuitive functionality.
Setup security using dynamic Web matrices. Define your security directly in 360View R2 and avoid possible translation errors from Excel planning sheets.
Apply your custom security profiles. Then use them directly in the security matrices.
Use bulk actions to set parameters such as default passwords and preferences for users, to import users from an Excel sheet or to set several rights at one time.
Universes and documents on BOBJ repository (security domain).
Reports giving a 360 degree view of current security and allowing you to make three modules: Audit, Cleaning and Security matrices.
1. Audit: Allowing to make a complete audit of deployed security like useful affectations and useless ones not to be reproduced under Xi.
2. Cleaning: Allowing to reduce the number of objects (universes, documents...), rights and actors to migrate.
3. Xir2 security matrices: Accurate BOE Xir2 security matrices to reproduce in the CMC and the Designer: Universes and documents folders, groups definition and rights between them
Document and Audit with Accuracy
In addition capture creation time, last update time and ID. Moreover you can share this information with end-users for further validation.
Export to Excel your deployed security using automatic generation of rights matrices.
View all inherited rights, instantaneously calculated inside the Web matrices. Update rights and see the impact on inherited rights immediately.
Our unique 360-degree security vision will give you the opportunity to control who can access reports, universes, connections, applications and what each user can view, use and do.