stealthintercept overview
DESCRIPTION
Advanced Threat Protection for your business. StealthINTERCEPT is a real-time monitoring and enforcement solution capable of integrating with SIEM that provides policy-based security enforcement to protect an organization’s critical business assets from attackers both within and outside the organization.TRANSCRIPT
STEALTHbits Technologies, Inc.StealthINTERCEPT®
StealthINTERCEPT®THE MISSING LINK FOR
ADVANCED DATA SECURITY
Organizations are faced with the constant challenge of ensuring that only the right people have access to the right assets at the right time 1The challenges presented by cloud, mobile and sophisticated attackers demand a new approach to security2STEALTHbits’ integrated portfolio has new capabilities to help organizations secure data and Active Directory as a new perimeter3
Three Takeaways
Native logging kills performance
Important events easily missed
Many events not supported at all
Events inconsistent across platforms and versions
Connecting business impact to events near impossible
Before and after values supported badly or not at all
No guarantee that critical events are being logged
No centralized command and control for logging
FileSystem
Active Directory
Microsoft Exchange
Group Policy
No dependence on native logging
Supports all activity, on all platforms, with all details, all the time
Intelligent analysis allows you to be laser-focused on what’s important
Get alerted on what matters in real-time
Prevent critical changes that impact your business
Centralized command and control achieved
The Benefits of Real-Time Interception
StealthINTERCEPT®THE MISSING LINK FOR
ADVANCED DATA SECURITY
StealthINTERCEPT Database
Active Directory
Group Policy
File System
Prevent
Report
Audit
!
Alert
Microsoft Exchange
Top Use Cases
Suspicious Behavior Detection
Account ProtectionGroup Protection IT Asset Protection Information
Protection
SIEM (w/ context)
!
StealthINTERCEPT®THE MISSING LINK FOR
ADVANCED DATA SECURITY
Prevent Advanced Threatso Determine brute force attacks and block
them before the damage is doneo Alert on suspicious activity to critical data
Enhance Your Administrative Modelo Prevent administrators from accessing
restricted datao Extend native security capabilities
Protect Your Critical Business Assetso Monitor and prevent changes to critical
Group Policies and OUso Alert and block improper access to critical
files
Advanced Threat Detection
Enhanced Administrative Model
Critical Business Asset Protection
Active Directory
Exchange
File Shares Servers
SharePointDesktops
StealthINTERCEPT®
StealthINTERCEPT®THE MISSING LINK FOR
ADVANCED DATA SECURITY
Top Reports
Group Membership Changes Security Policy Enforcement Changes – GPO’s
Horizontal Movement of Accounts
Privileged Group Modifications
Domain Controller & Server Physical Access Detection
Security Changes on Folders and Files
Microsoft Exchange Mailbox Breaches
SIEM Integration
StealthINTERCEPT®THE MISSING LINK FOR
ADVANCED DATA SECURITY
Attend a Demoo www.stealthbits.com/events
Next Steps
Request a Trialo www.stealthbits.com/trial
Learn Moreo www.stealthbits.com/resources
Ask Us a Questiono www.stealthbits.com/company/contact-us