STEALTHbits Technologies, a provider of the industry’s most comprehensive IT security and compliance platform, has recently introduced StealthINTERCEPT Exchange Authority for email hosting solution Microsoft (News - Alert) Exchange.
Microsoft Exchange is an effective sharing and collaborating solution. By implementing this offering, businesses are able to set up websites to share information across the entire organization and manage documents from start to finish.
The newly announced StealthINTERCEPT Exchange Authority for Microsoft Exchange offers real-time visibility into the changes occurring within the Microsoft Exchange Server ecosystem.
This latest addition to the STEALTHbits product portfolio efficiently monitors and prevents change and access activities. It also provides industry-first capabilities to block and prevent change and access events from occurring.
In addition to these functions, the Exchange Authority also helps organizations meet stringent audit and compliance guidelines set forth by SOX, HIPAA, PCI (News - Alert)-DSS, FISMA and other regulatory conditions.
“From meeting compliance requirements to the ever-present risk presented by both malicious and accidental alterations within Exchange to its configurations, a wide variety of users, from security specialists to governance groups, need greater insight into how changes are made, who is making them and why,” said Adam Laub, vice president, Global Product Management for STEALTHbits, in a statement.
He further added, “The native security controls within Exchange are not nearly robust enough to protect against the endless requirements to both adhering to compliance standards and ensuring appropriate security, making the arrival of Exchange Authority extremely timely and immediately relevant to organizations of all sizes.”
Organizations that decide to leverage StealthINTERCEPT’s Exchange Authority platform will be able to significantly enhance their control over every activity, permission and configuration policy made within Exchange. This will further help them to reduce the risk of security breaches and data leakage.
Edited by Jamie Epstein