Browsed by
Author: STEALTHbits Technologies

Data & Access Governance for the Masses (of servers)

Data & Access Governance for the Masses (of servers)

We’ve been building and perfecting our solution for data and access governance over the past few years and we’ve learned that two of the biggest considerations for data governance solutions are (1) Scalability and (2) Coverage. Scalability Scalability is critical. Any solution that attempts to scan a server will take some amount of time depending on how big the server is and how deep the scan goes. We can’t control the number of servers or the fact that scanners take…

Read More Read More

Open File Shares: A Pragmatic Approach

Open File Shares: A Pragmatic Approach

A number of STEALTHbits’ customers have reported that their #1 audit challenge boils down to open file shares. Auditors are clearly concerned with access and while it’s difficult to understand access rights across millions of individual files, it’s immediately apparent when there are file shares that are open to anyone. But, how do you approach a problem that spans across thousands of servers? Do you implement a monitoring solution for three months? Manually sift through each one? Well, you could…

Read More Read More

StealthINTERCEPT and CSI

StealthINTERCEPT and CSI

So, in the “new and upcoming news” category, StealthINTERCEPT is due out shortly here at STEALTHbits. With a name like that, we’re not suprisingly referring to it as SI internally right now. And since I’m sitting up here in Canada going through some webpage design for the roll-out, I think of it as CSI. And then I get to thinking – CSI – well, it may not be bones and blood tests, but it’s sure useful for Corporate System Investigation….

Read More Read More

Jack of all Trades, Master of Data & Access Governance

Jack of all Trades, Master of Data & Access Governance

You’ve heard it before – that nagging phrase that makes you feel like you’re underachieving or stretching yourself too thin: Jack of all trades, Master of none. Yet, in today’s world of click-happy multi-tasking, that phrase is ringing less and less true. To be effective, the demand within organizations now seems to be for Jacks of all trades, people who can wear multiple hats in order to obtain a complete picture. Perhaps nowhere is this more obvious than within the…

Read More Read More

SharePoint Management Self-Service

SharePoint Management Self-Service

Managing user access within SharePoint is a chore, but reducing permissions sprawl (way too many people having access) and keeping access organized and up-to-date is critical if you want to really understand what SharePoint resources are being used, and who is using them. Unfortunately, due to a variety of reasons, SharePoint is often out-of-date when it comes to permissions. Factors like: Lots of users with management permissions having the rights to change permissions and assign permissions to other users No…

Read More Read More

High Risk(y) Business: Controlling the Threat of High Risk Shares

High Risk(y) Business: Controlling the Threat of High Risk Shares

Try this: go to your favorite search engine, and type in “high risk share.” Chances are, you’ll get the same thing I did: pages and pages of financial information dealing with risky shares as they pertain to stocks. The definition and even identification of a high risk stock is fairly straightforward (at least in theory). In the IT space, though, high risk shares are much broader in term, and can be difficult to identify (which, in turn, makes them difficult…

Read More Read More

Controlling SharePoint Sites

Controlling SharePoint Sites

SharePoint is growing more and more prevalent in organizations, and offers a great way for users to interact and share content remotely for collaboration on projects. With the increasing use of SharePoint, however, SharePoint admins are facing the same issues that plagued (and, in many cases, continue to plague) administrators of the distributed file system. Increasingly, sites are growing stale, violating ethical wall regulations, and being deemed “high risk” in terms of access and permissions settings. Each of these issues…

Read More Read More

The Exchange Mailbox Mess

The Exchange Mailbox Mess

Permissions get messy over time. Whether it’s in Exchange, SharePoint, the File System, Active Directory, or elsewhere, people will enter and leave the organization, change roles, and require different levels of access as time goes on. Exchange mailbox permissions offer a particular challenge because of multiple layers of access: permissions associated to mailboxes, delegate rights assigned, and even mailbox rights in Active Directory on the user’s account. Multiple problems can result: Default and Anonymous access can be set incorrectly, default…

Read More Read More

Back to Basics for Security: Why Industry Compliance Regulations Matter, and Why They’re Hard

Back to Basics for Security: Why Industry Compliance Regulations Matter, and Why They’re Hard

We talk about governance and compliance a whole lot on this blog, and for good reason. Across the board, IT security is a difficult undertaking, and it’s becoming more challenging by the day. For one thing, security threats from outside of the organization have only increased in the last few years, with hackers becoming more sophisticated. From the glamorization of hacking in popular culture (see Girl With A Dragon Tattoo hacker heroine Lisbeth Salander) to ‘hacking kits’ available online (see…

Read More Read More

The SharePoint Governance Challenge

The SharePoint Governance Challenge

Microsoft SharePoint has become a leading solution for enterprise collaboration and document management. SharePoint supports a decentralized approach to administration, allowing organizations to assign Site Collection Administrators and Site Owners responsibilities for managing subsets of SharePoint content. While this delegation of responsibility may streamline the collaborative process in ways, it comes at a cost. Without proper governance plans in place within your SharePoint environment, SharePoint sites can begin to sprout up uncontrollably and may only be used for a matter…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.