what’s new in netwrix auditor 9...tighten access around sensitive data and enforce the least...
TRANSCRIPT
Russell McDermott
Manager, Pre-Sales Engineering
What’s New in Netwrix Auditor 9.7
What’s New in Netwrix Auditor 9.7
Briefly About Netwrix Auditor
Q&A
Prize Drawing
Agenda
INTRODUCING NETWRIX AUDITOR 9.7
Detect and Block Attacks on Your Network Devices
WHAT’S NEW IN NETWRIX AUDITOR 9.7
Netwrix Auditor for Network Devices
Visibility into SharePoint Permissions
User Profile Automated Response
Netwrix Auditor for Network Devices
Detect and investigate network security threats
Why Do You Need Netwrix Auditor
for Network Devices?
Detect and investigate suspicious activity around network devices
Enforce strong and effective controls
Minimize costly network downtime
What Does Netwrix Auditor for
Network Devices Provide?
Visibility into changes to the configuration of Cisco and Fortinet firewalls, switches and routers
Insight into successful and failed attempts to log on to network devices, including VPN logon attempts
Visibility into remote access to your network
Detection of scanning threats
Visibility into hardware malfunctions of your network devices
Netwrix Auditor for Network Devices
Demonstration
Visibility into SharePoint Permissions
See who has access to what on your SharePoint
Tighten access around sensitive data and enforce the least privilege principle
Prove to auditors that you are able to control access to sensitive data
Create a more manageable and transparent SharePoint environment
SharePoint is infamous for its complicated permissions layout, which is nearly impossible to untangle
using only native tools. Seeing who has access to what enables companies to:
Why Do You Need Visibility into SharePoint Permissions?
How Can You Use Visibility Into SharePoint Permissions?
Analyze permissions to site collections with sensitive data
Align user privileges with their responsibilities
Identify broken inheritance
Visibility into SharePoint Permissions
Demonstration
User Profile
Speed investigations with information about suspicious accounts
What Is the Value Behind the User Profile?
Who
did
that?
Check account attributes in AD
Check group membership in Netwrix Auditor
Two extra steps
Two new screens to switch between
What Can You Use User Profile Details for?
To accelerate investigations
To make more informed
response decisions in less
time
User Profile
Demonstration
Automated Response
Ensure instant response to incidents
What Is the Value of Automated Response?
Automated response saves you the time and trouble of responding to common and
anticipated threats so you can allocate them to other more demanding tasks.
Automated Response
Ticket Created
Response time decreased
Here’s how it works in Netwrix Auditor:
Account Lockout
Automated Response
Demonstration
Other Major Improvements
Customizable IT Risk Assessment dashboard
Enhanced visibility into SQL Server logons and changes
“In Group” filter in search and alerts
Other Major Improvements
Other Major Improvements
Demonstration
About Netwrix Auditor
A visibility platform for user behavior analysis and risk mitigation
that enables control over changes, configurations and access in hybrid IT environments.
It provides security intelligence to identify security holes, detect anomalies in user behavior
and investigate threat patterns in time to prevent real damage.
Netwrix Auditor
Netwrix Auditor for Office 365
Netwrix Auditor for Windows File Servers
Netwrix Auditor for Windows Server
Netwrix Auditor for VMware
Netwrix Auditor for Exchange
Netwrix Auditor for SQL Server
Netwrix Auditor for SharePoint
Netwrix Auditor for NetApp
Netwrix Auditor for EMC
Netwrix Auditor Platform
Netwrix Auditor for Azure AD
Netwrix Auditor Unified Platform
Netwrix Auditor for Network Devices
Netwrix Auditor for Active Directory
Netwrix Auditor for Oracle Database
The Big Picture
IT can’t assess security posture
and determine which assets
need the most protection.
Proactively identify and
mitigate IT security weak
spots, and prioritize data
protection efforts.
Lack of actionable intelligence
makes it hard to prevent policy
violations and data breaches.
Gain full control over user
permissions. Lock down
overexposed data and prevent
data breaches and privilege
abuse.
Incidents go unnoticed. Noise
and alert fatigue make it hard to
discern real threats.
Quickly identify real security
threats with alerts on
anomalous activity and details
about high-risk user accounts.
Forensics teams can’t analyze
attacks to understand how they
could have been stopped.
Trace attacks step by step to
learn from them and prevent
similar incidents in the future.
PREDICT
RESP OND DETECT
PREVENT
P R O B L E M
S O L U T I O N
P R O B L E M
S O L U T I O N
P R O B L E M
S O L U T I O N
P R O B L E M
S O L U T I O N
Automated Response and User Profile
Netwrix Auditor for Network Devices
Visibility into SharePoint Permissions
Enhanced IT Risk Assessment Dashboard
Next Steps
Free trial: Set up Netwrix Auditor in your own test environment netwrix.com/auditor9.7
Virtual appliance: Get Netwrix Auditor up and running in minutes netwrix.com/go/appliance
In-browser demo: Run a demo right in your browser with no need to install anything
netwrix.com/go/browser_demo
Upcoming and on-demand webinars : Join upcoming webinars or watch recorded ones
netwrix.com/webinars
netwrix.com/webinars#featured