stealthintercept overview

7
STEALTHbits Technologies, Inc. StealthINTERCEPT ®

Upload: stealthbits-technologies

Post on 17-Jun-2015

642 views

Category:

Technology


1 download

DESCRIPTION

Advanced Threat Protection for your business. StealthINTERCEPT is a real-time monitoring and enforcement solution capable of integrating with SIEM that provides policy-based security enforcement to protect an organization’s critical business assets from attackers both within and outside the organization.

TRANSCRIPT

Page 1: StealthINTERCEPT Overview

STEALTHbits Technologies, Inc.StealthINTERCEPT®

Page 2: StealthINTERCEPT Overview

StealthINTERCEPT®THE MISSING LINK FOR

ADVANCED DATA SECURITY

Organizations are faced with the constant challenge of ensuring that only the right people have access to the right assets at the right time 1The challenges presented by cloud, mobile and sophisticated attackers demand a new approach to security2STEALTHbits’ integrated portfolio has new capabilities to help organizations secure data and Active Directory as a new perimeter3

Three Takeaways

Page 3: StealthINTERCEPT Overview

Native logging kills performance

Important events easily missed

Many events not supported at all

Events inconsistent across platforms and versions

Connecting business impact to events near impossible

Before and after values supported badly or not at all

No guarantee that critical events are being logged

No centralized command and control for logging

FileSystem

Active Directory

Microsoft Exchange

Group Policy

No dependence on native logging

Supports all activity, on all platforms, with all details, all the time

Intelligent analysis allows you to be laser-focused on what’s important

Get alerted on what matters in real-time

Prevent critical changes that impact your business

Centralized command and control achieved

The Benefits of Real-Time Interception

Page 4: StealthINTERCEPT Overview

StealthINTERCEPT®THE MISSING LINK FOR

ADVANCED DATA SECURITY

StealthINTERCEPT Database

Active Directory

Group Policy

File System

Prevent

Report

Audit

!

Alert

Microsoft Exchange

Top Use Cases

Suspicious Behavior Detection

Account ProtectionGroup Protection IT Asset Protection Information

Protection

SIEM (w/ context)

!

Page 5: StealthINTERCEPT Overview

StealthINTERCEPT®THE MISSING LINK FOR

ADVANCED DATA SECURITY

Prevent Advanced Threatso Determine brute force attacks and block

them before the damage is doneo Alert on suspicious activity to critical data

Enhance Your Administrative Modelo Prevent administrators from accessing

restricted datao Extend native security capabilities

Protect Your Critical Business Assetso Monitor and prevent changes to critical

Group Policies and OUso Alert and block improper access to critical

files

Advanced Threat Detection

Enhanced Administrative Model

Critical Business Asset Protection

Active Directory

Exchange

File Shares Servers

SharePointDesktops

StealthINTERCEPT®

Page 6: StealthINTERCEPT Overview

StealthINTERCEPT®THE MISSING LINK FOR

ADVANCED DATA SECURITY

Top Reports

Group Membership Changes Security Policy Enforcement Changes – GPO’s

Horizontal Movement of Accounts

Privileged Group Modifications

Domain Controller & Server Physical Access Detection

Security Changes on Folders and Files

Microsoft Exchange Mailbox Breaches

SIEM Integration

Page 7: StealthINTERCEPT Overview

StealthINTERCEPT®THE MISSING LINK FOR

ADVANCED DATA SECURITY

Attend a Demoo www.stealthbits.com/events

Next Steps

Request a Trialo www.stealthbits.com/trial

Learn Moreo www.stealthbits.com/resources

Ask Us a Questiono www.stealthbits.com/company/contact-us