SlideShare une entreprise Scribd logo
1  sur  10
STEALTHbits Technologies, Inc.
Exchange Management Solutions
STEALTHbits Technologies
All About Data. Why Go With STEALTHbits?
For over a decade, STEALTHbits
has been a trusted partner to
the world’s largest organizations,
and some of the smallest too.
STEALTHbits is a “roll up our sleeves”
organization that gets the job done –
an important trait in difficult times when
the stakes have never been higher.
300+ clients across
5 continents
5 out of the top 6
Global Financials
OEM’ed by
Gartner’s Leading
IAM platforms
Integrated w/
biggest names in
technology
96% Customer
Retention Rate 65% Techs
Self-funded since
day 1
STEALTHbits Technologies
All About Data.
 Deep-level auditing, reporting, and remediation workflows for
Exchange and Exchange-related infrastructure
 Agent-less
 On-premise
STEALTHbits’ Exchange Product Portfolio
 Real-time monitoring and prevention of change and access for
Exchange and Active Directory
 Agent-based
 On-premise
STEALTHbits Technologies
All About Data. StealthAUDIT® Management Platform
MESSAGING
EXCHANGE
Groups | Users | Computers
CENTRALIZED RESOURCE MANAGEMENT
DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING
35+ Data Collection Sources
Agentless/Applet/Driver Architecture
Extensible Framework, Easy Additions
Correlate Conformance
Notification
Change Rules/Scorecard
History/Trends
Communicate Add
Workflow
Automate Modify
Delete
Static
Dynamic
Interactive
SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE
SHAREPOINT
FILE SYSTEM
SQL
DESKTOPS
SERVERSMOBILITY LYNC
DIRECTORY SERVICES
LDAP
ACTIVE DIRECTORY
AD EX FS SP SQL OS MOB
Private Store
Public Store
Metabase
Tracking Logs
Logs
Databases
Devices
Infrastructure
Users
Groups
Policies
Schema
Permissions
Shares
Files
Event Logs
Farms
Sites
Folders
Lists
Permissions
Tables
Instances
Event Logs
Services
Event Logs
WMI
System/Disk
DNS
Ex Configuration
Ex Mailbox
Ex Public Folder
Ex Metrics
SP Content
SP Activity
PerfMON
Disk Info
Registry
Services
Patch Check
System Info
WMI
Text Search
PowerShell
Command Line
SmartLog
Event Log
BlackBerry
File System
File Access
File Activity
SP Access
Ex PowerShell
Active Directory
LDAP
Group Policy
Users & Groups
AD Inventory
SQL
ODBC
UNIX
VB Script
INI File
Correlation Conformance
Change
Detection
Rules & Scorecards
History &
Trending
Notification &
Alerting
Survey Mailbox Public Folder
Active
Directory
File System SharePoint RegistryMail Merge
Web-based Dashboards Data ExportBuilt-in Reporting Engine
START
FINISH
DATA
COLLECTION
1
ANALYSIS
2
REMEDIATION
3
REPORTING
4
Exchange
Data Access
Governance
Active
Directory
Systems
Governance
Automated Solutions
STEALTHbits Technologies
All About Data. StealthINTERCEPT®
ACTIVE DIRECTORY
(INCLUDING GROUP POLICY & LDAP)
FILE SYSTEM
RULES ENGINE
Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®)
CHANGE MONITORING
Who Made the Change? Proactively Prevent Changes
Historical Retention for Audit & Compliance
REPORTING
CHANGE BLOCKING
ALERTING
Real-time Syslog to SIEM & Event Notification
EXCHANGE
STEALTHbits Technologies
All About Data. StealthINTERCEPT® Product Architecture
Block
Report
! Alert

SIEM
STEALTHbits Technologies
All About Data. Logical Product Architecture
Permissions &
Access
Usage Configuration
Exchange
SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING
Active
Directory
Non-Exchange
DataSources
STEALTHbits
metabase
UC Mobility
Operating
System
Databases,
& External
Feeds
STEALTHbits Technologies
All About Data. STEALTHbits’ Exchange Solution Set
Access  Who has access to what?
 Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers
 What type of access do they have?
 Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships
Usage &
Clean-up
 Who is using what?
 Operations & Maintenance
 Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)
 Security
 Mailbox Logons, Permission Changes, Membership Changes
Investigation  Productivity Concerns
 Is someone close to reaching their mailbox quota?
 Is someone receiving too much mail?
 Security Concerns
 Where are improper permissions applied?
 Who has excessive access or membership?
 What objects have excessive access or membership?
 Who can impersonate another user (Send As)?
 Who has Full Mailbox Access to a mailbox?
 Who has administrative access to Exchange?
 Is someone modifying Exchange configurations?
 Operational Concerns
 Is someone causing excessive IIS Connections
(AS, OWA, OAA)?
 Is someone causing excessive Mail-Flow
(send/receive)?
 Are Delivery Times trending poorly?
 Are databases reaching dangerous limits?
 Has Exchange configuration drifted?
STEALTHbits Technologies
All About Data.
 Attend a Demo
o www.stealthbits.com/events
Next Steps
 Request a Trial
o www.stealthbits.com/trial
 Learn More
o www.stealthbits.com/resources
 Ask Us a Question
o www.stealthbits.com/company/contact-us
Free Trial!
http://www.stealthbits.com/Trial

Contenu connexe

Tendances

Sqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateMikeLeszcz
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsElasticsearch
 
Real-Time Clinical Analytics
Real-Time Clinical AnalyticsReal-Time Clinical Analytics
Real-Time Clinical AnalyticsDataWorks Summit
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...Sonia Usih, PMP, MCPM, BSc.
 
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Cambridge Semantics
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Alexandra Giannopoulou
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Praveen Raman
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataTrustArc
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classificationWatchful Software
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataSaama
 
Introduction to Anzo Unstructured
Introduction to Anzo UnstructuredIntroduction to Anzo Unstructured
Introduction to Anzo UnstructuredCambridge Semantics
 
Ecosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesEcosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesChris White
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureYehuda Korotkin
 

Tendances (20)

Sqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big App
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
 
ISIDOR-1page
ISIDOR-1pageISIDOR-1page
ISIDOR-1page
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
Real-Time Clinical Analytics
Real-Time Clinical AnalyticsReal-Time Clinical Analytics
Real-Time Clinical Analytics
 
10 things in Big Data Analytics
10 things in Big Data Analytics 10 things in Big Data Analytics
10 things in Big Data Analytics
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Why Lead with Risk? by Doug LandollNTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World Data
 
Introduction to Anzo Unstructured
Introduction to Anzo UnstructuredIntroduction to Anzo Unstructured
Introduction to Anzo Unstructured
 
Ecosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesEcosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slides
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 

En vedette

PRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXPRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXMarketing_Interbox
 
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDNuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDCICAT SALUD
 
Presntacion industria del videojuego
Presntacion industria del videojuegoPresntacion industria del videojuego
Presntacion industria del videojuegojake1villa
 
Mirando al misterio - Samael Aun Weor
Mirando al misterio -  Samael Aun WeorMirando al misterio -  Samael Aun Weor
Mirando al misterio - Samael Aun WeorSara Rivera
 
Lectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialLectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialwacf
 
Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación  Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación Alejandro Cost
 
Arbitrajegrupo
ArbitrajegrupoArbitrajegrupo
ArbitrajegrupoKarina867
 
MUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAMUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAHéctor Rago
 
SEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingSEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingNeeraj Reddy
 
Apuntes p..importante no borrar
Apuntes p..importante no borrarApuntes p..importante no borrar
Apuntes p..importante no borrardayre05
 
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSILas 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSIinnovacionycualificacion
 

En vedette (20)

CATALOGO INTERBOX 01
CATALOGO INTERBOX 01  CATALOGO INTERBOX 01
CATALOGO INTERBOX 01
 
PRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXPRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOX
 
Annual Report 2014
Annual Report 2014Annual Report 2014
Annual Report 2014
 
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDNuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
 
NOTICIAS CURIOSAS
NOTICIAS CURIOSASNOTICIAS CURIOSAS
NOTICIAS CURIOSAS
 
BRUGG ROHRSYSTEM AG CERTIFIED BY SERCONS
BRUGG  ROHRSYSTEM  AG CERTIFIED BY SERCONSBRUGG  ROHRSYSTEM  AG CERTIFIED BY SERCONS
BRUGG ROHRSYSTEM AG CERTIFIED BY SERCONS
 
SRJC Preso Final
SRJC Preso FinalSRJC Preso Final
SRJC Preso Final
 
La urgencia de innovar - Singularity University
La urgencia de innovar - Singularity University La urgencia de innovar - Singularity University
La urgencia de innovar - Singularity University
 
Hi pig_JSDay-v2
Hi pig_JSDay-v2Hi pig_JSDay-v2
Hi pig_JSDay-v2
 
Presntacion industria del videojuego
Presntacion industria del videojuegoPresntacion industria del videojuego
Presntacion industria del videojuego
 
Mirando al misterio - Samael Aun Weor
Mirando al misterio -  Samael Aun WeorMirando al misterio -  Samael Aun Weor
Mirando al misterio - Samael Aun Weor
 
First quarter 2012
First quarter 2012First quarter 2012
First quarter 2012
 
Lectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialLectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serial
 
WSKG Proposal Updated
WSKG Proposal UpdatedWSKG Proposal Updated
WSKG Proposal Updated
 
Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación  Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación
 
Arbitrajegrupo
ArbitrajegrupoArbitrajegrupo
Arbitrajegrupo
 
MUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAMUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIA
 
SEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingSEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital Marketing
 
Apuntes p..importante no borrar
Apuntes p..importante no borrarApuntes p..importante no borrar
Apuntes p..importante no borrar
 
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSILas 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
 

Similaire à STEALTHbits Solutions for Exchange

Rev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRyan Andhavarapu
 
Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Laura Stevens
 
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsWebinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsKinetica
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloudImpetus Technologies
 
Chip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureChip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureMarco van der Hart
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_ENSaraLampret
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentTeradata
 
Manage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositoryManage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositorySynaltic Group
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeAli Hodroj
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It? Caserta
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...DataWorks Summit
 
Big Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseBig Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseCaserta
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancySathish K S
 
Alten calsoft labs analytics service offerings
Alten calsoft labs   analytics service offeringsAlten calsoft labs   analytics service offerings
Alten calsoft labs analytics service offeringsSandeep Vyas
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...DATAVERSITY
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data LakeCaserta
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
 

Similaire à STEALTHbits Solutions for Exchange (20)

Rev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRev_3 Components of a Data Warehouse
Rev_3 Components of a Data Warehouse
 
Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”
 
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsWebinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloud
 
Chip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureChip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochure
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_EN
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology Investment
 
InfoTrellis Corporate
InfoTrellis CorporateInfoTrellis Corporate
InfoTrellis Corporate
 
Manage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositoryManage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repository
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It?
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...
 
Big Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseBig Data's Impact on the Enterprise
Big Data's Impact on the Enterprise
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancy
 
Alten calsoft labs analytics service offerings
Alten calsoft labs   analytics service offeringsAlten calsoft labs   analytics service offerings
Alten calsoft labs analytics service offerings
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data Lake
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsZilliz
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

STEALTHbits Solutions for Exchange

  • 2. STEALTHbits Technologies All About Data. Why Go With STEALTHbits? For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
  • 3. STEALTHbits Technologies All About Data.  Deep-level auditing, reporting, and remediation workflows for Exchange and Exchange-related infrastructure  Agent-less  On-premise STEALTHbits’ Exchange Product Portfolio  Real-time monitoring and prevention of change and access for Exchange and Active Directory  Agent-based  On-premise
  • 4. STEALTHbits Technologies All About Data. StealthAUDIT® Management Platform MESSAGING EXCHANGE Groups | Users | Computers CENTRALIZED RESOURCE MANAGEMENT DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING 35+ Data Collection Sources Agentless/Applet/Driver Architecture Extensible Framework, Easy Additions Correlate Conformance Notification Change Rules/Scorecard History/Trends Communicate Add Workflow Automate Modify Delete Static Dynamic Interactive SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE SHAREPOINT FILE SYSTEM SQL DESKTOPS SERVERSMOBILITY LYNC DIRECTORY SERVICES LDAP ACTIVE DIRECTORY
  • 5. AD EX FS SP SQL OS MOB Private Store Public Store Metabase Tracking Logs Logs Databases Devices Infrastructure Users Groups Policies Schema Permissions Shares Files Event Logs Farms Sites Folders Lists Permissions Tables Instances Event Logs Services Event Logs WMI System/Disk DNS Ex Configuration Ex Mailbox Ex Public Folder Ex Metrics SP Content SP Activity PerfMON Disk Info Registry Services Patch Check System Info WMI Text Search PowerShell Command Line SmartLog Event Log BlackBerry File System File Access File Activity SP Access Ex PowerShell Active Directory LDAP Group Policy Users & Groups AD Inventory SQL ODBC UNIX VB Script INI File Correlation Conformance Change Detection Rules & Scorecards History & Trending Notification & Alerting Survey Mailbox Public Folder Active Directory File System SharePoint RegistryMail Merge Web-based Dashboards Data ExportBuilt-in Reporting Engine START FINISH DATA COLLECTION 1 ANALYSIS 2 REMEDIATION 3 REPORTING 4 Exchange Data Access Governance Active Directory Systems Governance Automated Solutions
  • 6. STEALTHbits Technologies All About Data. StealthINTERCEPT® ACTIVE DIRECTORY (INCLUDING GROUP POLICY & LDAP) FILE SYSTEM RULES ENGINE Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®) CHANGE MONITORING Who Made the Change? Proactively Prevent Changes Historical Retention for Audit & Compliance REPORTING CHANGE BLOCKING ALERTING Real-time Syslog to SIEM & Event Notification EXCHANGE
  • 7. STEALTHbits Technologies All About Data. StealthINTERCEPT® Product Architecture Block Report ! Alert  SIEM
  • 8. STEALTHbits Technologies All About Data. Logical Product Architecture Permissions & Access Usage Configuration Exchange SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING Active Directory Non-Exchange DataSources STEALTHbits metabase UC Mobility Operating System Databases, & External Feeds
  • 9. STEALTHbits Technologies All About Data. STEALTHbits’ Exchange Solution Set Access  Who has access to what?  Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers  What type of access do they have?  Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships Usage & Clean-up  Who is using what?  Operations & Maintenance  Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)  Security  Mailbox Logons, Permission Changes, Membership Changes Investigation  Productivity Concerns  Is someone close to reaching their mailbox quota?  Is someone receiving too much mail?  Security Concerns  Where are improper permissions applied?  Who has excessive access or membership?  What objects have excessive access or membership?  Who can impersonate another user (Send As)?  Who has Full Mailbox Access to a mailbox?  Who has administrative access to Exchange?  Is someone modifying Exchange configurations?  Operational Concerns  Is someone causing excessive IIS Connections (AS, OWA, OAA)?  Is someone causing excessive Mail-Flow (send/receive)?  Are Delivery Times trending poorly?  Are databases reaching dangerous limits?  Has Exchange configuration drifted?
  • 10. STEALTHbits Technologies All About Data.  Attend a Demo o www.stealthbits.com/events Next Steps  Request a Trial o www.stealthbits.com/trial  Learn More o www.stealthbits.com/resources  Ask Us a Question o www.stealthbits.com/company/contact-us Free Trial! http://www.stealthbits.com/Trial

Notes de l'éditeur

  1. What we do really well Help you understand Usage Access Configuration Automate the collection, analysis & reporting of the data you need to see every day Instantiating workflows to remediate certain conditions like object staleness and access Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets Instantiate and enforce policies that prevent particular events from happening ….and doing this at the largest scales What we’re not We’re not a black box – we’re a platform We’re not a brainless reporting solution for metrics and mailbox sizes We’re not a Diagnostic tool
  2. Engage with us Go to our website to learn more Request a Trial of what it is that we spoke about today