Identity and Access Management

OpenText NetIQ Data Access Governance

Gain insights, secure unstructured data, and prevent unauthorized access

OpenText™ NetIQ™ Data Access Governance


OpenText™ NetIQ™ Data Access Governance

OpenText™ NetIQ™ Data Access Governance is a comprehensive solution that pinpoints where valuable files are stored and identifies the individuals who can access them. It then automatically makes necessary adjustments to ensure your unstructured data is secure, optimized, and compliant.

Discover what NetIQ DAG can do for you

Why choose NetIQ Data Access Governance?

  • Maximum data control

    Manage unstructured data, network file systems, and access permissions.

  • Data access and permissions visibility

    Gain insights into individuals with access to high-value files and uncover the mechanisms that grant their access.

  • File security

    Safeguard your critical data assets by identifying potential vulnerabilities and security gaps.

  • Automated file relocation

    Relocate high-value files to more secure network locations through automated processes.

  • Data protection policies

    Establish and enforce policies aimed at preventing unauthorized access, fortifying security measures, and ensuring compliance with access policies—all while upholding data integrity.

How NetIQ Data Access Governance can benefit business

Discover the advantages of using NetIQ Data Access Governance.

  • Gain visibility into data access

    Gain visibility into data access

    Analyze file system data to understand what data you have and who has access to it.

  • Streamline user provisioning

    Streamline user provisioning

    Automatically provision data storage, assign permissions, and control access.

  • Reduce data access risk

    Reduce data access risk

    Monitor high-risk data, enforce fencing policies, and notify owners when access permissions change.

  • Govern data access

    Govern data access

    Empower business users to certify access to data and applications in the same interface.


  • Enhanced reporting

    Enables corrective measures with improved reporting that can identify sensitive and high-value files and track user access.

  • Least privilege user access

    Protects sensitive and high-value data repositories by limiting access permissions only to policy-authorized users—preventing “privilege creep” over time.

  • Overexposure correction

    Identifies unauthorized access to sensitive and high-value data, whether due to improper group membership or insecure storage, and enacts policies or workloads to mitigate the associated risks.

Read the flyer

Explore the advantages of OpenText and partner services

Professional Services

OpenText Consulting Services combines end-to-end solution implementation with comprehensive technology services to help improve systems.


OpenText helps customers find the right solution, the right support and the right outcome.


OpenText Learning Services offers comprehensive enablement and learning programs to accelerate knowledge and skills.


Explore our OpenText communities. Connect with individuals and companies to get insight and support. Get involved in the discussion.

NetIQ Data Access Governance resources

Protecting your data from unauthorized access requires a governance approach for all of your data

Read the flyer

Ransomware relies on poor data access governance

Read the flash point paper

Expanding your identity and access management system

Read the flyer

How to create permissions scan policies in File Reporter

Watch the video

How to create a security lockdown policy in File Dynamics

Watch the video

Ransomware relies on poor data access governance

Read the blog

The value of identity-powered data access governance

Read the blog