{"id":2158,"date":"2019-01-22T21:36:12","date_gmt":"2019-01-22T20:36:12","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=2158"},"modified":"2019-01-22T21:40:07","modified_gmt":"2019-01-22T20:40:07","slug":"stealthaudit","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/stealthbits\/stealthaudit\/","title":{"rendered":"StealthAUDIT"},"content":{"rendered":"<p><strong>StealthAUDIT Management Platform<\/strong><br \/>\nThe StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open<br \/>\narchitecture, small footprint, and powerful collection capabilities ensure that our products are flexible<br \/>\nenough to provide value in any IT environment.<\/p>\n<p>StealthAUDIT for Data Access Governance is an auditing, compliance, and governance solution for unstructured data<br \/>\nand critical applications. It provides organizations with the ability to understand and control who has access to what<br \/>\ndata.<\/p>\n<p><strong>Top Features:<\/strong><br \/>\n\uf0b7 Effective Access Analysis \u2013 SMP for DAG calculates the cumulative access that a user has based on Active Directory<br \/>\ngroup membership and end point permissions.<br \/>\n\uf0b7 Sensitive Data Discovery \u2013 SMP for DAG scans for sensitive data throughout the enterprise, using keyword and<br \/>\nregular expression criteria to identify various forms of PII and IP.<br \/>\n\uf0b7 Ownership Identification \u2013 SMP for DAG will identify owners for resources based on who has access to the resource<br \/>\nand who actually uses the resource. Once owners are identified, SMP for DAG will actually set the owner on the<br \/>\nresource as well.<br \/>\n\uf0b7 Data Activity Tracking \u2013 SMP for DAG tracks user activity to provide an understanding of who is using what data<br \/>\nand how they are using it.<br \/>\nIdentify Threats. Secure data. Reduce risk. 1<br \/>\n\uf0b7 AD Inventory &amp; Collections<br \/>\n\uf0b7 Agentless Architecture<br \/>\n\uf0b7 Flexible Analysis<br \/>\n\uf0b7 Remediation &amp; Interaction<br \/>\nData Sheet<br \/>\n\uf0b7 Certification &amp; Attestation \u2013 Once owners have been assigned to resources, SMP for DAG can manage the<br \/>\ncertification process for the resources, ensuring that data owners are given the opportunity to determine who<br \/>\nshould have access to their data.<br \/>\n\uf0b7 Open Access Remediation \u2013 Given SMP for DAG\u2019s deep understanding of access, the product will identify instances<br \/>\nof \u201copen access\u201d, where nearly every user in the environment has access to a given resource and all of the data<br \/>\nthat resides there.<\/p>\n<p><strong>Supported Systems: <\/strong><\/p>\n<p><strong>StealthAUDIT for Active Directory<\/strong><br \/>\nStealthAUDIT for Active Directory is an auditing, compliance, and management solution for Active Directory. It provides<br \/>\nIT with unprecedented knowledge about the relationships between objects in the environment, as well as a one-stop<br \/>\nshop for auditing AD settings.<br \/>\nTop Features:<br \/>\n\uf0b7 Stale Object Management \u2013 SMP for AD identifies stale objects (users, groups, and computers) and contains builtin workflows for deprovisioning and disabling these objects.<br \/>\n\uf0b7 Group Membership Analysis \u2013 SMP for AD collects and analyzes group membership information from AD to<br \/>\ndetermine exactly who is a member of what group, regardless of how deeply nested the object is.<br \/>\n\uf0b7 Group Grants &amp; Effective Access Analysis \u2013 SMP for AD provides IT with an understanding of which resources AD<br \/>\ngroups are granting access to, and what will be affected if they were to change the group\u2019s membership.<br \/>\n\uf0b7 Probable Owner Identification \u2013 SMP for AD uses algorithms based on group membership to identify and assign the<br \/>\nmost likely owner for a given group.<br \/>\n\uf0b7 Access Change Modeling \u2013 Before making changes to AD groups, SMP for AD will inform IT how the change will<br \/>\nimpact group membership and access across the entire environment.<br \/>\n\uf0b7 Change Auditing \u2013 SMP for AD provides in depth change auditing of Active Directory, so that administrators can see<br \/>\nwhat is changing in their environment and who is making the changes.<\/p>\n<p>Supported Systems:<br \/>\n\uf0b7 Microsoft Active Directory \uf0b7 Azure Active Directory<br \/>\n\uf0b7 Applications: Microsoft SharePoint<br \/>\n\uf0b7 Office 365: SharePoint Online,<br \/>\nMicrosoft OneDrive for Business<br \/>\n\uf0b7 File Systems: NTFS, Samba, NFS,<br \/>\nNetApp<br \/>\n\uf0b7 NAS: EMC Isilon, EMC Celerra, Hitachi<\/p>\n<p><strong>StealthAUDIT for Exchange<\/strong><br \/>\nStealthAUDIT for Exchange provides surgical insight into access, usage, and environmental configuration so<br \/>\norganizations can ensure optimal security and performance within Microsoft Exchange.<\/p>\n<p><strong>Top Features:<\/strong><br \/>\nStealthAUDIT for Systems Governance gives organizations the information necessary to ensure that the systems<br \/>\nresponsible for storing their data are protected by allowing IT to gather and analyze information about servers and<br \/>\nendpoints.<\/p>\n<p><strong>StealthINTERCEPT<\/strong> safeguards your organization from malicious threats and accidental changes by acting<br \/>\nas a firewall around your Active Directory and the systems it supports. By intercepting and inspecting all<br \/>\nActive Directory, Exchange, and File System traffic at the source, StealthINTERCEPT generates security<br \/>\nintelligence in real-time without relying on native logs.<\/p>\n<p>Top Features:<br \/>\n\uf0b7 Authentication-Based Attack Detection &#8211; StealthINTERCEPT Authentication Analytics detects malware propagation<br \/>\nand bad actors scouring your network through pattern-based recognition authentication activities in real-time.<br \/>\n\uf0b7 Privileged Account Monitoring \u2013 Accounts with elevated permissions can be monitored in real-time to ensure that<br \/>\naccess is not being misused.<br \/>\n\uf0b7 Change Detection and Blocking \u2013 StealthINTERCEPT gathers detailed change information in real-time and can even<br \/>\nprevent changes from taking place.<br \/>\n\uf0b7 Real-Time Alerting \u2013 All changes detected by StealthINTERCEPT can be alerted on instantly to ensure that<br \/>\nadministrators are aware of the most critical events.<\/p>","protected":false},"excerpt":{"rendered":"<p>StealthAUDIT Management Platform The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small footprint, and powerful collection capabilities ensure that our products are flexible enough to provide value in any IT environment. StealthAUDIT for Data Access Governance is an auditing, compliance, and governance solution for unstructured data and critical [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":2151,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2158","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>StealthAUDIT | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"description\" content=\"StealthAUDIT Management Platform The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/fr\/stealthbits\/stealthaudit\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"StealthAUDIT | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:description\" content=\"StealthAUDIT Management Platform The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/fr\/stealthbits\/stealthaudit\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T20:40:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/#webpage\",\"url\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/\",\"name\":\"StealthAUDIT | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-01-22T20:36:12+00:00\",\"dateModified\":\"2019-01-22T20:40:07+00:00\",\"description\":\"StealthAUDIT Management Platform The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/stealthbits\/stealthaudit\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/2158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=2158"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/2158\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/2151"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=2158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}