Sertalink

sales@sertalink.com  BE: +32(0)3/337.17.01.    LUX: +352(0)27/94.06.59.

Sertalink
R

ACTIVE DIRECTORY AUDITING

Active Directory Auditing solution from STEALTHbits enables you to inventory, analyze and report on Active Directory to secure and optimize AD.

R

ACTIVE DIRECTORY CHANGE AUDITING

Active Directory change auditing solution from STEALTHbits delivers security and compliance via real-time reporting, alerting and blocking of changes.

R

ACTIVE DIRECTORY ENTERPRISE PASSWORD POLICY ENFORCEMENT

Password policy enforcement tools for Windows Active Directory that provide password protection on-premises and in hybrid environments.

R

ACTIVE DIRECTORY GROUP GOVERNANCE

The most efficient way to manage access in AD is by using groups. However, if not properly managed, AD groups can become a security risk.

R

ACTIVE DIRECTORY MANAGEMENT AND SECURITY

Active Directory Management and Security solutions from STEALTHbits enable organizations to effectively manage and secure Active Directory.

R

ACTIVE DIRECTORY ROLLBACK AND RECOVERY

The AD Recycle Bin only provides the ability to recover recently deleted items, not rollback changes or keep multiple versions of objects.

R

ACTIVE DIRECTORY CLEANUP

STEALTHbits Active Directory cleanup solutions provide an inventory of Active Directory such as stale AD objects, toxic conditions and group owners.

R

ACTIVE DIRECTORY PERMISSIONS AUDITING AND REPORTING

Active Directory permissions analysis solution from STEALTHbits that enables auditing and reporting on the AD domain, organizational unit, and object permissions.

R

ACTIVE DIRECTORY SECURITY PORTFOLIO

Active Directory Security solutions from STEALTHbits enable organizations to effectively manage and secure Active Directory.

R

DOMAIN CONSOLIDATION

STEALTHbits Domain Consolidation solutions provides the power to take back control of Active Directory through easy data consolidation workflow.

R

IAM READNESS

STEALTHbits Identity and Access Management (IAM) solutions ensures your IAM deployment is completed on time and with minimal disruption.

R

CLOUD DATA ACCESS GOVERNANCE

STEALTHbits Cloud Data Access Governance solutions helps control unstructured data on the cloud and determine access rights to it.

R

DATA ACCESS GOVERNANCE

STEALTHbits protects unstructured data and sensitive information with data governance tools and software.

R

DATA ACCESS GOVERNANCE WORKFLOWS

Governance workflows are a business strategy to ensure and verify appropriate access between business users and their data.

R

ENTITLEMENT REVIEWS

The STEALTHbits Entitlement Review workflows guides business owners through the process of reviewing and certifying access.

R

OPEN ACCESS REMEDIATION

Discover who has open access to critical file shares and how they are getting that access.

R

OWNERSHIP IDENTIFICATION

STEALTHbits Ownership Identification solutions helps organizations identify owners of unstructured data resources and Active Directory (AD) groups.

R

PRIVILIGED ACCESS MANAGEMENT

Identify privileged accounts and monitor activity to ensure your Privileged Access Management (PAM) initiative is successful.

R

PUBLIC FOLDER CLEAN-UP

STEALTHbits Public Folder Cleanup solutions enables organizations to cleanup their Public Folder infrastructures.

R

SELF-SERVICE ACCESS REQUESTS

Enable end users to submit access requests to resources directly to the resource’s business owner, without relying on IT.

R

SPLUNK FSCHANGE ALTERNATIVE

File Activity Monitoring, Splunk fschange alternative, tracks read,write, create, and delete file system events and detects ransomware.

R

STORAGE RECLAMATION

STEALTHbits helps with storage reclamation by giving you the ability to create workflows that automates data scanning and classification to data migration, archiving, and more.

R

SENSITIVE DATA DISCOVERY

STEALTHbits Sensitive Data Discovery solutions identifies sensitive information within unstructured data, locating PCI, PII, PHI, and more to reduce your sensitive data footprint.

R

CHANGE AUDITING

STEALTHbits change auditing solutions provide organizations with information and tools to understand what is changing in Active Directory in real-time.

R

FILE ACTIVITY MONITORING

File Activity Monitoring tracks read, write, create, and delete file system events and detects ransomware.

R

LDAP MONITORING FOR SECURITY

LDAP monitoring for Security Software detects reconnaissance of Active Directory objects and attributes and prevents attacks earlier in the kill chain.

R

REAL-TIME ALERTING

Alert on changes being made to Active Directory without reliance on native logging.

R

RANSOMWARE

Learn how to stop ransomware attacks through ransomware detection,ransomware removal, and the use of anti ransomware software.

R

THREAT DETECTION

STEALTHbits Threat Detection solutions provides critical capabilities needed to address insider threats through reliable security intelligence in real-time.

X