SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
STEALTHbits Technologies, Inc.
Exchange Management Solutions
STEALTHbits Technologies
All About Data. Why Go With STEALTHbits?
For over a decade, STEALTHbits
has been a trusted partner to
the world’s largest organizations,
and some of the smallest too.
STEALTHbits is a “roll up our sleeves”
organization that gets the job done –
an important trait in difficult times when
the stakes have never been higher.
300+ clients across
5 continents
5 out of the top 6
Global Financials
OEM’ed by
Gartner’s Leading
IAM platforms
Integrated w/
biggest names in
technology
96% Customer
Retention Rate 65% Techs
Self-funded since
day 1
STEALTHbits Technologies
All About Data.
 Deep-level auditing, reporting, and remediation workflows for
Exchange and Exchange-related infrastructure
 Agent-less
 On-premise
STEALTHbits’ Exchange Product Portfolio
 Real-time monitoring and prevention of change and access for
Exchange and Active Directory
 Agent-based
 On-premise
STEALTHbits Technologies
All About Data. StealthAUDIT® Management Platform
MESSAGING
EXCHANGE
Groups | Users | Computers
CENTRALIZED RESOURCE MANAGEMENT
DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING
35+ Data Collection Sources
Agentless/Applet/Driver Architecture
Extensible Framework, Easy Additions
Correlate Conformance
Notification
Change Rules/Scorecard
History/Trends
Communicate Add
Workflow
Automate Modify
Delete
Static
Dynamic
Interactive
SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE
SHAREPOINT
FILE SYSTEM
SQL
DESKTOPS
SERVERSMOBILITY LYNC
DIRECTORY SERVICES
LDAP
ACTIVE DIRECTORY
AD EX FS SP SQL OS MOB
Private Store
Public Store
Metabase
Tracking Logs
Logs
Databases
Devices
Infrastructure
Users
Groups
Policies
Schema
Permissions
Shares
Files
Event Logs
Farms
Sites
Folders
Lists
Permissions
Tables
Instances
Event Logs
Services
Event Logs
WMI
System/Disk
DNS
Ex Configuration
Ex Mailbox
Ex Public Folder
Ex Metrics
SP Content
SP Activity
PerfMON
Disk Info
Registry
Services
Patch Check
System Info
WMI
Text Search
PowerShell
Command Line
SmartLog
Event Log
BlackBerry
File System
File Access
File Activity
SP Access
Ex PowerShell
Active Directory
LDAP
Group Policy
Users & Groups
AD Inventory
SQL
ODBC
UNIX
VB Script
INI File
Correlation Conformance
Change
Detection
Rules & Scorecards
History &
Trending
Notification &
Alerting
Survey Mailbox Public Folder
Active
Directory
File System SharePoint RegistryMail Merge
Web-based Dashboards Data ExportBuilt-in Reporting Engine
START
FINISH
DATA
COLLECTION
1
ANALYSIS
2
REMEDIATION
3
REPORTING
4
Exchange
Data Access
Governance
Active
Directory
Systems
Governance
Automated Solutions
STEALTHbits Technologies
All About Data. StealthINTERCEPT®
ACTIVE DIRECTORY
(INCLUDING GROUP POLICY & LDAP)
FILE SYSTEM
RULES ENGINE
Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®)
CHANGE MONITORING
Who Made the Change? Proactively Prevent Changes
Historical Retention for Audit & Compliance
REPORTING
CHANGE BLOCKING
ALERTING
Real-time Syslog to SIEM & Event Notification
EXCHANGE
STEALTHbits Technologies
All About Data. StealthINTERCEPT® Product Architecture
Block
Report
! Alert

SIEM
STEALTHbits Technologies
All About Data. Logical Product Architecture
Permissions &
Access
Usage Configuration
Exchange
SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING
Active
Directory
Non-Exchange
DataSources
STEALTHbits
metabase
UC Mobility
Operating
System
Databases,
& External
Feeds
STEALTHbits Technologies
All About Data. STEALTHbits’ Exchange Solution Set
Access  Who has access to what?
 Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers
 What type of access do they have?
 Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships
Usage &
Clean-up
 Who is using what?
 Operations & Maintenance
 Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)
 Security
 Mailbox Logons, Permission Changes, Membership Changes
Investigation  Productivity Concerns
 Is someone close to reaching their mailbox quota?
 Is someone receiving too much mail?
 Security Concerns
 Where are improper permissions applied?
 Who has excessive access or membership?
 What objects have excessive access or membership?
 Who can impersonate another user (Send As)?
 Who has Full Mailbox Access to a mailbox?
 Who has administrative access to Exchange?
 Is someone modifying Exchange configurations?
 Operational Concerns
 Is someone causing excessive IIS Connections
(AS, OWA, OAA)?
 Is someone causing excessive Mail-Flow
(send/receive)?
 Are Delivery Times trending poorly?
 Are databases reaching dangerous limits?
 Has Exchange configuration drifted?
STEALTHbits Technologies
All About Data.
 Attend a Demo
o www.stealthbits.com/events
Next Steps
 Request a Trial
o www.stealthbits.com/trial
 Learn More
o www.stealthbits.com/resources
 Ask Us a Question
o www.stealthbits.com/company/contact-us
Free Trial!
http://www.stealthbits.com/Trial

Contenu connexe

Tendances

Sqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateMikeLeszcz
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsElasticsearch
 
Real-Time Clinical Analytics
Real-Time Clinical AnalyticsReal-Time Clinical Analytics
Real-Time Clinical AnalyticsDataWorks Summit
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...Sonia Usih, PMP, MCPM, BSc.
 
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Cambridge Semantics
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Alexandra Giannopoulou
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Praveen Raman
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataTrustArc
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classificationWatchful Software
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataSaama
 
Introduction to Anzo Unstructured
Introduction to Anzo UnstructuredIntroduction to Anzo Unstructured
Introduction to Anzo UnstructuredCambridge Semantics
 
Ecosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesEcosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesChris White
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureYehuda Korotkin
 

Tendances (20)

Sqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big App
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
 
ISIDOR-1page
ISIDOR-1pageISIDOR-1page
ISIDOR-1page
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
Real-Time Clinical Analytics
Real-Time Clinical AnalyticsReal-Time Clinical Analytics
Real-Time Clinical Analytics
 
10 things in Big Data Analytics
10 things in Big Data Analytics 10 things in Big Data Analytics
10 things in Big Data Analytics
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Why Lead with Risk? by Doug LandollNTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
Transforming Data Management and Time to Insight with Anzo Smart Data Lake®
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World Data
 
Introduction to Anzo Unstructured
Introduction to Anzo UnstructuredIntroduction to Anzo Unstructured
Introduction to Anzo Unstructured
 
Ecosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slidesEcosystm BreakFirst presentation slides
Ecosystm BreakFirst presentation slides
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 

En vedette

PRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXPRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXMarketing_Interbox
 
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDNuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDCICAT SALUD
 
Presntacion industria del videojuego
Presntacion industria del videojuegoPresntacion industria del videojuego
Presntacion industria del videojuegojake1villa
 
Mirando al misterio - Samael Aun Weor
Mirando al misterio -  Samael Aun WeorMirando al misterio -  Samael Aun Weor
Mirando al misterio - Samael Aun WeorSara Rivera
 
Lectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialLectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialwacf
 
Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación  Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación Alejandro Cost
 
Arbitrajegrupo
ArbitrajegrupoArbitrajegrupo
ArbitrajegrupoKarina867
 
MUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAMUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAHéctor Rago
 
SEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingSEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingNeeraj Reddy
 
Apuntes p..importante no borrar
Apuntes p..importante no borrarApuntes p..importante no borrar
Apuntes p..importante no borrardayre05
 
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSILas 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSIinnovacionycualificacion
 

En vedette (20)

CATALOGO INTERBOX 01
CATALOGO INTERBOX 01  CATALOGO INTERBOX 01
CATALOGO INTERBOX 01
 
PRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOXPRESENTACIÓN CORPORATIVA INTERBOX
PRESENTACIÓN CORPORATIVA INTERBOX
 
Annual Report 2014
Annual Report 2014Annual Report 2014
Annual Report 2014
 
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUDNuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
Nuevas modalidades en la formación del técnico en enfermería - CICAT-SALUD
 
NOTICIAS CURIOSAS
NOTICIAS CURIOSASNOTICIAS CURIOSAS
NOTICIAS CURIOSAS
 
BRUGG ROHRSYSTEM AG CERTIFIED BY SERCONS
BRUGG  ROHRSYSTEM  AG CERTIFIED BY SERCONSBRUGG  ROHRSYSTEM  AG CERTIFIED BY SERCONS
BRUGG ROHRSYSTEM AG CERTIFIED BY SERCONS
 
SRJC Preso Final
SRJC Preso FinalSRJC Preso Final
SRJC Preso Final
 
La urgencia de innovar - Singularity University
La urgencia de innovar - Singularity University La urgencia de innovar - Singularity University
La urgencia de innovar - Singularity University
 
Hi pig_JSDay-v2
Hi pig_JSDay-v2Hi pig_JSDay-v2
Hi pig_JSDay-v2
 
Presntacion industria del videojuego
Presntacion industria del videojuegoPresntacion industria del videojuego
Presntacion industria del videojuego
 
Mirando al misterio - Samael Aun Weor
Mirando al misterio -  Samael Aun WeorMirando al misterio -  Samael Aun Weor
Mirando al misterio - Samael Aun Weor
 
First quarter 2012
First quarter 2012First quarter 2012
First quarter 2012
 
Lectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serialLectura practica2 digitales_arduino_puerto_serial
Lectura practica2 digitales_arduino_puerto_serial
 
WSKG Proposal Updated
WSKG Proposal UpdatedWSKG Proposal Updated
WSKG Proposal Updated
 
Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación  Injusticia en los modelos de comunicación
Injusticia en los modelos de comunicación
 
Arbitrajegrupo
ArbitrajegrupoArbitrajegrupo
Arbitrajegrupo
 
MUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIAMUSICA VENEZOLANA: EL ZULIA
MUSICA VENEZOLANA: EL ZULIA
 
SEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital MarketingSEO - OnPage Optimization - Digital Marketing
SEO - OnPage Optimization - Digital Marketing
 
Apuntes p..importante no borrar
Apuntes p..importante no borrarApuntes p..importante no borrar
Apuntes p..importante no borrar
 
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSILas 10 fases del proceso de enseñanza y aprendizaje de FSI
Las 10 fases del proceso de enseñanza y aprendizaje de FSI
 

Similaire à STEALTHbits Solutions for Exchange

Rev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRyan Andhavarapu
 
Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Laura Stevens
 
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsWebinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsKinetica
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloudImpetus Technologies
 
Chip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureChip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureMarco van der Hart
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_ENSaraLampret
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentTeradata
 
Manage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositoryManage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositorySynaltic Group
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeAli Hodroj
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It? Caserta
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...DataWorks Summit
 
Big Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseBig Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseCaserta
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancySathish K S
 
Alten calsoft labs analytics service offerings
Alten calsoft labs   analytics service offeringsAlten calsoft labs   analytics service offerings
Alten calsoft labs analytics service offeringsSandeep Vyas
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...DATAVERSITY
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data LakeCaserta
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
 

Similaire à STEALTHbits Solutions for Exchange (20)

Rev_3 Components of a Data Warehouse
Rev_3 Components of a Data WarehouseRev_3 Components of a Data Warehouse
Rev_3 Components of a Data Warehouse
 
Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”Mind the Gap: Between ITSM & SAM in the ITIL World”
Mind the Gap: Between ITSM & SAM in the ITIL World”
 
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSetsWebinar: The Modern Streaming Data Stack with Kinetica & StreamSets
Webinar: The Modern Streaming Data Stack with Kinetica & StreamSets
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloud
 
Chip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochureChip ICT | Hgst storage brochure
Chip ICT | Hgst storage brochure
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_EN
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology Investment
 
InfoTrellis Corporate
InfoTrellis CorporateInfoTrellis Corporate
InfoTrellis Corporate
 
Manage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repositoryManage tracability with Apache Atlas, a flexible metadata repository
Manage tracability with Apache Atlas, a flexible metadata repository
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It?
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...Balancing data democratization with comprehensive information governance: bui...
Balancing data democratization with comprehensive information governance: bui...
 
Big Data's Impact on the Enterprise
Big Data's Impact on the EnterpriseBig Data's Impact on the Enterprise
Big Data's Impact on the Enterprise
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancy
 
Alten calsoft labs analytics service offerings
Alten calsoft labs   analytics service offeringsAlten calsoft labs   analytics service offerings
Alten calsoft labs analytics service offerings
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data Lake
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 

Dernier

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Dernier (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

STEALTHbits Solutions for Exchange

  • 2. STEALTHbits Technologies All About Data. Why Go With STEALTHbits? For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
  • 3. STEALTHbits Technologies All About Data.  Deep-level auditing, reporting, and remediation workflows for Exchange and Exchange-related infrastructure  Agent-less  On-premise STEALTHbits’ Exchange Product Portfolio  Real-time monitoring and prevention of change and access for Exchange and Active Directory  Agent-based  On-premise
  • 4. STEALTHbits Technologies All About Data. StealthAUDIT® Management Platform MESSAGING EXCHANGE Groups | Users | Computers CENTRALIZED RESOURCE MANAGEMENT DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING 35+ Data Collection Sources Agentless/Applet/Driver Architecture Extensible Framework, Easy Additions Correlate Conformance Notification Change Rules/Scorecard History/Trends Communicate Add Workflow Automate Modify Delete Static Dynamic Interactive SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE SHAREPOINT FILE SYSTEM SQL DESKTOPS SERVERSMOBILITY LYNC DIRECTORY SERVICES LDAP ACTIVE DIRECTORY
  • 5. AD EX FS SP SQL OS MOB Private Store Public Store Metabase Tracking Logs Logs Databases Devices Infrastructure Users Groups Policies Schema Permissions Shares Files Event Logs Farms Sites Folders Lists Permissions Tables Instances Event Logs Services Event Logs WMI System/Disk DNS Ex Configuration Ex Mailbox Ex Public Folder Ex Metrics SP Content SP Activity PerfMON Disk Info Registry Services Patch Check System Info WMI Text Search PowerShell Command Line SmartLog Event Log BlackBerry File System File Access File Activity SP Access Ex PowerShell Active Directory LDAP Group Policy Users & Groups AD Inventory SQL ODBC UNIX VB Script INI File Correlation Conformance Change Detection Rules & Scorecards History & Trending Notification & Alerting Survey Mailbox Public Folder Active Directory File System SharePoint RegistryMail Merge Web-based Dashboards Data ExportBuilt-in Reporting Engine START FINISH DATA COLLECTION 1 ANALYSIS 2 REMEDIATION 3 REPORTING 4 Exchange Data Access Governance Active Directory Systems Governance Automated Solutions
  • 6. STEALTHbits Technologies All About Data. StealthINTERCEPT® ACTIVE DIRECTORY (INCLUDING GROUP POLICY & LDAP) FILE SYSTEM RULES ENGINE Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®) CHANGE MONITORING Who Made the Change? Proactively Prevent Changes Historical Retention for Audit & Compliance REPORTING CHANGE BLOCKING ALERTING Real-time Syslog to SIEM & Event Notification EXCHANGE
  • 7. STEALTHbits Technologies All About Data. StealthINTERCEPT® Product Architecture Block Report ! Alert  SIEM
  • 8. STEALTHbits Technologies All About Data. Logical Product Architecture Permissions & Access Usage Configuration Exchange SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING Active Directory Non-Exchange DataSources STEALTHbits metabase UC Mobility Operating System Databases, & External Feeds
  • 9. STEALTHbits Technologies All About Data. STEALTHbits’ Exchange Solution Set Access  Who has access to what?  Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers  What type of access do they have?  Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships Usage & Clean-up  Who is using what?  Operations & Maintenance  Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)  Security  Mailbox Logons, Permission Changes, Membership Changes Investigation  Productivity Concerns  Is someone close to reaching their mailbox quota?  Is someone receiving too much mail?  Security Concerns  Where are improper permissions applied?  Who has excessive access or membership?  What objects have excessive access or membership?  Who can impersonate another user (Send As)?  Who has Full Mailbox Access to a mailbox?  Who has administrative access to Exchange?  Is someone modifying Exchange configurations?  Operational Concerns  Is someone causing excessive IIS Connections (AS, OWA, OAA)?  Is someone causing excessive Mail-Flow (send/receive)?  Are Delivery Times trending poorly?  Are databases reaching dangerous limits?  Has Exchange configuration drifted?
  • 10. STEALTHbits Technologies All About Data.  Attend a Demo o www.stealthbits.com/events Next Steps  Request a Trial o www.stealthbits.com/trial  Learn More o www.stealthbits.com/resources  Ask Us a Question o www.stealthbits.com/company/contact-us Free Trial! http://www.stealthbits.com/Trial

Notes de l'éditeur

  1. What we do really well Help you understand Usage Access Configuration Automate the collection, analysis & reporting of the data you need to see every day Instantiating workflows to remediate certain conditions like object staleness and access Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets Instantiate and enforce policies that prevent particular events from happening ….and doing this at the largest scales What we’re not We’re not a black box – we’re a platform We’re not a brainless reporting solution for metrics and mailbox sizes We’re not a Diagnostic tool
  2. Engage with us Go to our website to learn more Request a Trial of what it is that we spoke about today