{"id":3169,"date":"2019-04-03T12:52:16","date_gmt":"2019-04-03T11:52:16","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=3169"},"modified":"2019-04-03T12:52:16","modified_gmt":"2019-04-03T11:52:16","slug":"stealthintercept","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/stealthintercept\/","title":{"rendered":"StealthINTERCEPT"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221;][et_pb_row admin_label=&#8221;row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;30&#8243; text_text_color=&#8221;#0c71c3&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>ACTIVE DIRECTORY MONITORING<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;26&#8243; text_text_color=&#8221;#0c71c3&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><span class=\"text-non-captial\">StealthINTERCEPT<\/span>\u00ae: MONITORS AND PREVENTS THREATS<br \/>\nIN REAL-TIME FOR ACTIVE DIRECTORY SECURITY COMPLIANCE<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; text_font_size=&#8221;30&#8243; text_text_color=&#8221;#0c71c3&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>DETECTION, PREVENTION, AND ALERTING IN REAL TIME FOR ACTIVE DIRECTORY SECURITY COMPLIANCE<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p>See threats, both malicious and accidental, as they happen. Get active directory monitoring alerts in real time or use blocking to ensure threats don\u2019t become disasters.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;DETECT THREATS&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/threat-detection.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Detect threats with advanced authentication and file attack analytics to catch malware, ransomware, and bad guys on your network.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;SKIP THE LOGS WITH SIEM&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/real-time-threat-intelligence.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Integrate out of the box with the industry\u2019s leading SIEM vendors. Increase the signal to noise ratio and get actionable insight in real-time.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;ALERT IN REAL-TIME&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/real-time-event-alerts.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Know when threats emerge, changes happen, people misbehave, or processes go rogue as it happens.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;DETECT EVERY CHANGE IN ACTIVE DIRECTORY&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/change-auditing-and-compliance.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Detect every change to group memberships, GPOs, Mailbox and File permissions, as well as access activities like critical file access and Non-Owner Mailbox Access Events without the need for a single log.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;PREVENT CATASTROPHE&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/change-auditor.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Prevent changes and access to sensitive objects and resources like privileged accounts and security groups, VIP Mailboxes, and File Shares containing sensitive data and more.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][et_pb_blurb admin_label=&#8221;Blurb&#8221; title=&#8221;PREVENT OUTAGES&#8221; url_new_window=&#8221;off&#8221; use_icon=&#8221;off&#8221; icon_color=&#8221;#7EBEC5&#8243; use_circle=&#8221;off&#8221; circle_color=&#8221;#7EBEC5&#8243; use_circle_border=&#8221;off&#8221; circle_border_color=&#8221;#7EBEC5&#8243; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/domain-migration.png&#8221; icon_placement=&#8221;top&#8221; animation=&#8221;off&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; use_icon_font_size=&#8221;off&#8221; body_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; header_line_height=&#8221;1.5em&#8221;]<\/p>\n<p>Migrating, upgrading, consolidating, or simply decommissioning a domain controller? Use surgical authentication analysis to know beforehand what you\u2019re going to break.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; text_font_size=&#8221;30&#8243; text_text_color=&#8221;#0c71c3&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>StealthINTERCEPT Overview<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_image admin_label=&#8221;Image&#8221; src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/stealthintercept-overview.png&#8221; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; \/][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; text_font_size=&#8221;30&#8243; text_text_color=&#8221;#0c71c3&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>WHAT&#8217;S NEW:StealthINTERCEPT 5.2 is Here!<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;26&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>ENTERPRISE PASSWORD ENFORCER<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p>In 2016 the Verizon Data Breach Investigations Report (DBIR) stated that 63% of confirmed data breaches leverage a weak, default, or stolen password. The 2017 Verizon DBIR reported that 81% of hacking-related breaches leveraged either stolen and\/or weak passwords. And in the 2018 DBIR, use of stolen credentials remains a number one action in breaches. Attackers have demonstrated a consist ability to compromise accounts by leveraging passwords from prior breaches. For that reason, NIST Special Publication 800-63B (Authentication and Lifecycle Management, section 5.1.1.2*) recommends the use of \u201cMemorized Secret Verifiers\u201d such as the StealthINTERCEPT Enterprise Password Enforcer to reduce an attacker\u2019s chances of compromising credentials.<\/p>\n<p>StealthINTERCEPT 5.2 expands on the capabilities of STEALTHbits Enterprise Password Enforcer to include:<\/p>\n<p>Custom complexity &#8211; the ability to reject specific passwords that do not contain the characters from a set list. This is configurable on both the numeric and character level. Curated dictionary &#8211; the ability to reject passwords based on the fact that they are vulnerable to attack from a dictionary or hybrid cracking algorithm.<\/p>\n<ul>\n<li>Previous breach corpus &#8211; the ability to reject known compromised passwords from previous breach corpuses that are more susceptible to credential stuffing attacks.<\/li>\n<li>Length enforcement &#8211; the ability to reject passwords based on how many or few characters.<\/li>\n<li>User display\/logon name rejection &#8211; the ability to reject passwords that are similar to the user\u2019s display\/logon name.<\/li>\n<li>Special character enforcement &#8211; the ability to reject passwords that do or do not contain specific characters.<\/li>\n<li>String rejection &#8211; the ability to reject passwords that contain user-defined strings (e.g. Reject passwords with \u201cstealth\u201d anywhere in the password).<\/li>\n<li>Incremental digit avoidance &#8211; the ability to reject passwords that end in a number.<\/li>\n<li>Keyboard pattern rejection &#8211; the ability to reject passwords that contain keyboard patterns (e.g. Qwerty)<\/li>\n<li>Sequential character rejection &#8211; the ability to reject passwords that contain sequential characters.<\/li>\n<li>Repeating character rejection &#8211; the ability to reject passwords that contain character repetition.<\/li>\n<li>Unique character enforcement &#8211; the ability to reject passwords that do not contain a minimum number of unique characters.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>ACTIVE DIRECTORY MONITORING StealthINTERCEPT\u00ae: MONITORS AND PREVENTS THREATS IN REAL-TIME FOR ACTIVE DIRECTORY SECURITY COMPLIANCE DETECTION, PREVENTION, AND ALERTING IN REAL TIME FOR ACTIVE DIRECTORY SECURITY COMPLIANCE See threats, both malicious and accidental, as they happen. Get active directory monitoring alerts in real time or use blocking to ensure threats don\u2019t become disasters. Detect threats [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3169","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>StealthINTERCEPT | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/stealthintercept\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"StealthINTERCEPT | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/stealthintercept\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/#webpage\",\"url\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/\",\"name\":\"StealthINTERCEPT | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"datePublished\":\"2019-04-03T11:52:16+00:00\",\"dateModified\":\"2019-04-03T11:52:16+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/nl\/stealthintercept\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/nl\/stealthintercept\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/3169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=3169"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/3169\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=3169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}