Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

8MAN Release 9.0 with New Features

December 2017 by Marc Jacob

Protected Networks GmbH
Highlights include individual cockpits, 8MATE Exchange Logga which monitors inbox activity, alarms for FS Logga events and user profiles that facilitate compliance checks.

Access rights management from 8MAN has long been the benchmark in many security-driven companies and authorities. Now 8MAN has taken another technological leap forwards and is set to make release 9.0 available to all users on 12 December 2017.

The Manager Cockpit: boost the security powers of managers

Administrators are not the only ones responsible for access rights management and data security; managers are too. Protected Networks has therefore added a Manager Cockpit to 8MAN where every manager can ensure tighter data security and manage access privileges for their entire team or sphere of responsibility.
8MATE Exchange Logga: monitor inbox activity

Companies organise many important elements of communication with Microsoft Exchange. Access privileges are crucial, as is meticulous activity monitoring. The new 8MATE Exchange Logga logs the actions of inbox owners, their representatives and administrators, including actions that are of particular relevance to security:
• Hard delete: who has deleted emails, contacts or calendar entries from the Exchange server?
• MessageBind: has someone from IT viewed my emails?
• SendAs: who has sent emails in my name and when?
• SendOnBehalf: who has sent emails on my behalf and when?
• SoftDelete: who (except me) has deleted emails from my inbox?

8MATE Alerts: set file activity alarms

8MAN monitors the file server events triggered by users in order to log security incidents efficiently. If an unusually high number of file server events occur in a short period of time, 8MAN notifies everyone in charge of the following:
• Data theft: a user account reads an unusually large number of files in a short period of time (‘File read’)
• Sabotage: a user account deletes a lot of files in a short period of time (‘File delete’)
• Ransomware attacks: a user account carries out a combination of file creation and deletion (‘File create’ and ‘File delete’)

Compliance Check: define, apply and check user profiles

8MAN raises the bar for user provisions. With the new user profiles, managers, heads of department and compliance officers can define the extent of the IT privileges of employees within the company. Department specific profiles are now also available to set standards and optimise the overall joiner-mover-leaver process:
• When a user account is created, it is given the profile defined for the relevant field of activity.
• If an employee moves to a different department, the new superior can simply apply his/her departmental template to the user account.
• If an employee is granted additional non-standard privileges, a compliance monitor will notify the superior. A head of department can use bulk operations to bring the user accounts into line with the profile for his/her department. This is most important when a user account has been updated.
CEO Stephan Brack concludes: ‘In light of the upcoming General Data Protection Regulation, data security is of increasing relevance even from an official and judicial perspective. The new 8MAN features help companies meet the increasingly strict IT compliance requirements. – These requirements are not only being called for by legislators, but also frequently by customers and key certification bodies.’


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts