Introduction | SecurityHub

  • Updated

Applies to: Global Org Admins, IT Admins and Compliance Admins
 

SecurityHub is a unified cloud platform for chief information security officers (CISOs), compliance officers and IT teams to configure security policies to protect their users, data and Intralinks environments. SecurityHub gives customers insight into user activity and provides proactive risk mitigation and insider threat assessment. SecurityHub covers and oversees all Intralinks products.

SecurityHub features

The following features are available in SecurityHub:

  • Single sign-on (SSO) - Intralinks SSO enables users to seurely and seamlessly authenticate with the Intralinks platform using SAML2.0 or OIDC. This feature must be configured by the Intralinks Service Delivery team.
  • Access control at login - This option is for non-SSO customers. It ensures that each users has appropriate access to log into Intralinks as determined by the customer's IT admin. It also ensures that access is blocked to users that are not given access to Intralinks products. This feature must be configured by an Intralinks employee.
  • Admin Portal - The Admin Portal is where your organization's admins can manage security policies and monitor the activities of your users. 
  • Security Dashboard - The Security Dashboard consolidates and communicates critical information for monitoring and assessing the Intralinks ecosystem's security posture in near real-time. 
  • Identity+ - Identity+ enables your organization to stay secure and compliant when using shared/team/group accounts on Intralinks by creating an account with multiple users.
  • Security and compliance reports - Security and compliance reports show information about which users have logged in and where they have logged in from. Reports can be run immediately as needed or schedules to run at a particular date and time. 
  • Admin management - Admin management is where admins can add and delete other admins and edit admin roles. There are several levels of admin roles that are available in the SecuirtyHub. These roles determine the features that are available to users assigned these roles.

SecurityHub roles

All admin roles have access to all features that are configurable by the customer, however, not all roles can perform all actions, such as editing and deleting items as noted below. The following roles are available in SecurityHub:

  • Global Org Admin - This roles grants the highest level of access for overseeing all aspects of the Admin Portal and user access.
    • Security Dashboard - This role can access all features.
    • Security and compliance reports - This role can access all features, including modifying and deleting schedules created by other users.
    • Identity+ - This role can access all features.
    • Admin management - This role can modify and remove other users but cannot modify or remove themselves. This role is the only role that can invite and assign another Global Org Admin to the organization.
  • IT Admin - This role is for admins that will perform general tasks related to user management, access control, security settings, and reporting.
    • Security Dashboard - This role can access all features.
    • Security and compliance reports - This role can access all features. This role cannot modify or delete schedules created by other users.
    • Identity+ - This role can access all features.
    • Admin management - This role can modify and remove other IT Admins and Compliance Admins, but cannot modify or remove themselves or the Global Org admin users. This role can invite other IT Admins to the organization.
  • Compliance Admin - This role is for admins that will perform compliance-related activities, such as reviewing policies, reports and audits.
    • Security Dashboard - This role can access all features.
    • Security and compliance reports - This role can access all features. This role cannot modify or delete schedules created by other users.
    • Identity+ - This role can access all features.
    • Admin management - This role has view-only access.

Was this article helpful?