Unstructured-data scope
File shares, SharePoint, OneDrive, Box, Google Drive, and the long tail of unstructured stores. Traditional IGA misses this scope.
OpenText • Identity and access management
OpenText Data Access Governance carries the NetIQ Data Access Governance lineage with unstructured-data permission management, file share and SharePoint entitlement reviews, and audit-ready evidence on the data permissions traditional IGA misses.
Through Merito, Data Access Governance gets pointed at the customer's actual unstructured-data fabric (file shares, SharePoint, OneDrive, Box, Google Drive), prioritized by Core Data Discovery sensitivity classifications, and wired into NetIQ Identity Manager so rejected permissions actually get removed.
What it is
OpenText Data Access Governance carries the NetIQ Data Access Governance lineage. Traditional IAM and IGA products focus on application entitlements (who has access to which application, with which role) and miss unstructured-data permissions (who can read which folder on the file share, who has access to which SharePoint site, who has direct OneDrive shares from former employees). Data Access Governance closes that gap: it inventories unstructured-data permissions, runs entitlement reviews on them, and surfaces high-risk exposures.
Unstructured-data scope is the load-bearing capability. File share permissions, SharePoint and OneDrive entitlements, Box and Google Drive shares, and the long tail of unstructured-data stores accumulate exposure over time as users get added, never get removed, and inherit access through nested groups. Programs running rigorous IGA on application entitlements but ignoring unstructured-data permissions have audit exposure and breach risk on the data attackers actually want.
Native pairing with Identity Governance is the platform claim. Where Identity Governance handles application entitlement reviews, Data Access Governance handles unstructured-data permission reviews. Same review cadence, same audit-evidence packaging, same closed-loop reject-and-remediate workflow. Programs running both get unified IAM governance across structured and unstructured access.
What undermines Data Access Governance adoption is data-volume scope creep. Unstructured-data inventories often run into hundreds of millions of permissions, and programs that try to review everything end up reviewing nothing. The right pattern is to scope by data sensitivity (classified data first, then high-volume sensitive stores, then long tail), pair with Core Data Discovery for classification feeding, and sequence the rollout. Merito's engagement scopes by sensitivity rather than trying to boil the ocean.
Ideal use cases
What it is best at
File shares, SharePoint, OneDrive, Box, Google Drive, and the long tail of unstructured stores. Traditional IGA misses this scope.
Established case law in regulated programs that need unstructured-data permission rigor.
Coordinated review cadence and audit-evidence packaging across application and unstructured-data entitlements.
Surfaces nested-group permission inheritance that creates exposure programs do not realize they have.
Pairs with Core Data Discovery classifications to prioritize review on regulated data exposures.
Core capabilities
Where Data Access Governance maps the unstructured-data permission landscape.
File share scanning
NTFS, Samba, and other file share permission inventory.
SharePoint and OneDrive coverage
SharePoint site, library, and OneDrive direct-share permission inventory.
Cloud storage coverage
Box, Google Drive, S3, Azure Blob, GCS permission inventory.
Inherited-permission analysis
Surfaces nested-group inheritance that creates unintended exposure.
Closing the loop on unstructured-data permission risk.
Owner-led reviews
Folder-owner-led or business-owner-led entitlement reviews on a configurable cadence.
Reject-and-remediate workflow
Owner rejection flows into permission removal; closed-loop remediation.
Risk-aware review
Sensitivity-aware review prioritization (classified data reviewed more frequently).
Stale-permission detection
Surfaces permissions on accounts that have been terminated or are no longer in the relevant department.
Data Access Governance inside the OpenText IAM line.
Identity Governance integration
Coordinated review cadence with application-entitlement reviews.
Identity Manager integration
Reject-and-remediate flows back into Identity Manager for permission removal.
Core Data Discovery pairing
Sensitivity classifications inform review prioritization.
Compliance reporting
Audit-ready evidence for SOX, HIPAA, GDPR, and unstructured-data permission mandates.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Data Access Governance
Standard edition with unstructured-data permission inventory and entitlement review.
Best for: Programs extending IAM governance to unstructured data.
Data Access Governance with Identity Governance
Bundled with Identity Governance for unified IAM review across structured and unstructured access.
Best for: Programs running unified IAM governance.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Unstructured-data scoping, permission scanning, owner-led review design, OpenText IAM line integration, sensitivity-aware prioritization.
Explore service02IAM and unstructured-data governance program scoping for Data Access Governance alongside Varonis and Microsoft Purview.
Explore service03Permission-review automation and unified IAM workflow integration.
Explore service04Named engineer, priority SLAs, and release-time coverage for Data Access Governance.
Explore service05Long-term run support including review-cadence operation, sensitivity-aware policy maintenance, and IAM integration upkeep.
Explore service06Role-based training for compliance leaders, IAM operators, and folder-owner populations.
Explore service07Merito-placed identity engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Data Access Governance licensing
Data Access Governance pricing arrives with unstructured-data scoping, permission scanning, owner-led review design, and OpenText IAM line integration that close the unstructured-data gap traditional IGA leaves on file shares, SharePoint, and collaboration.
Merito point of view
Merito has audited IAM programs that ran rigorous Identity Governance on application entitlements and ignored file share, SharePoint, and OneDrive permissions. The result is comprehensive review of who has access to Salesforce and zero review of who can read the financial-data folder on the file share. Attackers know the difference; auditors do too. Data Access Governance closes the gap that traditional IGA misses.
Merito recommends OpenText Data Access Governance specifically for programs running OpenText IAM line and Identity Governance, and for programs subject to unstructured-data permission audit mandates. For programs picking specialist unstructured-data security depth, Varonis is the established market leader. For programs in a Microsoft-only ecosystem, Microsoft Purview Data Lifecycle Management covers some of the same ground. Merito surfaces those alternatives honestly during scoping.
Sensitivity-aware prioritization is the load-bearing operational decision. Programs that try to review every permission on every unstructured store end up reviewing nothing. The right pattern is to pair with Core Data Discovery for classification feeding and review classified-data exposures first. Merito treats sensitivity-aware prioritization as central work in the implementation.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your unstructured-data landscape, current IAM program, and compliance posture. A Merito OpenText specialist follows up within one business day.
Unstructured-data scope
The permissions traditional IGA misses. Where the data attackers want actually lives.
Sensitivity-aware
Classifications drive review prioritization so the program does not drown in volume.
Next step
A Merito Data Access Governance engagement starts with sensitivity-aware prioritization. Programs that run rigorous IGA without unstructured-data review leave the breach surface open.