Stibo Systems Platform can be configured to specify acceptable deviations and breach thresholds, and policies can be set to run at specified frequencies to ensure timely monitoring and enforcement.
With access to comprehensive information about each policy, including its current score, policy history, event history and any deviations over the last 24 hours, you can monitor fluctuations and trends in policy compliance over time.
A policy widget is available, so you can receive alerts to active policy breaches requiring further investigation.
You can also monitor workflow performance, including task assignments, deadlines and throughput, to ensure workflows are operating efficiently and in compliance with defined policies.
Stibo Systems Platform provides various authentication methods with Kerberos, allowing integration with existing user authentication infrastructures.
Email validation integration enables email account data to be checked for domain existence, malicious email addresses and user account existence. This automation ensures that email data is validated in the background, and it can be assigned a rating for overall email data quality.
Additionally, email data can be manually selected and sent for validation, providing automation for maintaining data quality.
With Stibo Systems Platform, user actions are set up and attached to user groups, enabling specific users to receive permissions due to membership in one or more of these groups. This ensures that only authorized users can access and manage data subject rights requests.
Users can view the transitions and states of an object within different workflows, providing a detailed audit trail.
Based on users’ privileges, they can view active tasks across all workflows for the selected object. This enables them to act on tasks, edit data and move tasks through the workflow, ensuring that data subject rights requests can be managed efficiently. They can also extract and generate customized reports on data subject rights requests.
Stibo Systems Platform supports compliance efforts, protecting a company’s customer data by maintaining accurate, up-to-date customer records, enforcing data governance policies and securing sensitive information to meet regulatory requirements and avoid penalties.
This strict consent protocol enables compliance with regulations such as the General Data Protection Regulation (GDPR), where businesses must meet several requirements in relation to how they collect and use the personal data of EU citizens – whether or not the company itself is European.
The foundation for complying with GDPR is that the personal data a business collects, stores and processes is updated, accessible and has clear data governance programs and business rules applied.
When the audit message framework component is activated, an audit message business action can be applied to workflows to enable analytics for any workflow out of the box.
Administrators can monitor the activity of change packages, including detailed logging and tracking for comprehensive audit trails, with item URLs for additions and deletions, sealing, reopening, importing, analyzing and installing.
Additionally, sensors for monitoring the audit message framework track the activity and performance of the audit messaging system.
Data can be easily integrated using the SQL API to generate customized reports and extractions that trace data lineage. This API consists of a series of views and stored packages that can be accessed via SQL, PL/SQL or other database-enabled programming languages.