top of page

News & Views

Office 365 visibility with Netwrix

As organizations seek more visibility into Office 365, information security and governance specialist, Netwrix (https://netwrix.com), has released Netwrix Auditor 9.9, which enables organizations to strengthen control over access to minimize the risk of data leaks and enforce the least-privilege model enterprise-wide.

New features available in Netwrix Auditor 9.9 include:

• Secure data storage in Office 365 – which clear insight into user permissions to data stored in SharePoint Online and OneDrive for Business, as well as delegate access in Exchange Online.  By regularly identifying and removing excessive permissions, organizations can mitigate the risk of privilege abuse, data leaks, compliance findings and business disruptions.

• Detect unauthorized attempts to log on to VMware – empowering IT specialists to detect failed logons to ESXi hosts and vCenter in time to thwart attacks.  It also helps them enforce access control by verifying that each successful logon was fully authorized, as required by many compliance regulations.

• Protect cloud applications against unauthorized access attempts – Netwrix Auditor for Active Directory now reports on Active Directory Federation Services logon attempts and provides actionable intelligence for incident investigation. This enables organizations to reduce the risk of attackers taking control of their business-critical cloud applications and prove compliance with less effort.

 “The key to data security is to establish effective access control across the entire IT environment, especially if data is also stored in the cloud.  Organizations often struggle with this challenge because of the diversity of IT systems, data assets and high number of users,” says Steve Dickson, CEO of Netwrix.

“Our new release adds capabilities that enable customers to tell which data stored in Office 365 is at risk and whether any users have been granted unnecessary privileges, so organizations can address the issues before it results in data leaks, compliance failures and business disruptions.”

IT

bottom of page