如需獲得最佳網頁瀏覽體驗,請使用 IE 11 或更高版本、Chrome、Firefox 或 Safari。

超过一半的安全违规事件是由已在网络内部的某个人所致。 即使最好的外围防御也无法阻止内部威胁,因此还要拥有强大的Active Directory安全与监管,这非常重要。

要有效打击内部威胁,您需要保护所有敏感数据,遵守数据隐私规定,并且持续通过审核。 为此,您必须能够控制用户权限,密切关注特权用户活动。 但是,SIEM的表现取决于您为其提供的数据,而且原生日志存在巨大的差距,在重要方面缺乏保真度。

您需要一个安全性与合规性解决方案来限制您的漏洞,帮助您快速响应威胁和安全违规。

每日AD网络攻击
平均网络攻击成本
发现攻击之前

您可信赖的安全性与合规性解决方案

Quest是可信赖的供应商,提供适用于任何内部部署或混合Microsoft环境的安全性与合规性解决方案。 我们提供全套的解决方案,使您可以像严密保护外围一样保护内部环境,并确保持续的合规性。

监管

监管

监管

适当的监管让您能够对违规事件进行补救,并快速、有效地缓减内部威胁。 Quest解决方案可自动执行管理任务,包括配置和取消配置用户,以封堵安全漏洞和降低风险。 基于审批的工作流程增加了额外的一层监管和控制。

  • 简化的用户和组管理
  • 安全组策略管理
  • 自动化监管策略
阅读电子书: SharePoint Governance Best Practices
阅读白皮书: How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
阅读白皮书: Governing GPOs with a Layered Security Framework

识别风险

识别风险

识别风险

Quest解决方案提供跨内部部署、混合或云环境的整合报告。 您可以直接从报告中轻松确定用户访问权限并适当调整权限。 您还可以发现敏感数据的驻留位置,这样您即可确保其受到保护,甚至在第一时间阻止关键对象被更改。

  • 单一视图中的整合报告
  • 敏感数据发现和分类
  • 自动化且可扩展的报告
  • 现场补救
阅读电子书: Your Five-Step Plan to SharePoint Security
阅读白皮书: OneDrive for Business Security and Monitoring
阅读电子书: Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats

检测和警报

检测和警报

通过提供对用户活动的实时审核以及对权限升级、不当更改及其他可疑活动提供警报,更快速地对潜在威胁发出警报。 用户行为分析可对各个用户行为模式进行建模,并检测异常操作。 您甚至可以实现响应自动化,禁用用户或撤消更改。

  • 全面审核和更改阻止
  • 通过用户行为分析检测威胁
  • 实时警报和响应操作
  • 智能且可扩展的事件日志压缩
阅读白皮书: What Is Azure ATP and How Does It Fit into Your Security Strategy?
阅读电子书: How to Spot Insider Threats Before They Wreak Havoc
阅读电子书: Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs

响应

响应

响应

利用集中数据收集以及类似Google的搜索和取证调查引擎,快速轻松地查明安全事件的根源。 此外,您可以建立虚拟测试实验室以进行灾难恢复规划和加快灾难恢复 – 从祼机配置到林恢复。

  • 类似Google的搜索和取证调查
  • 用于进行灾难恢复规划的虚拟测试实验室
  • 全面的备份和恢复 – 内部部署、混合或云
阅读技术简报: Preparing for Attacks that Seek Total Annihilation
阅读白皮书: The Windows Server 2016 and Azure AD Recycle Bins, and Quest Recovery Solutions
阅读白皮书: Active Directory Recovery in a Cloud or Hybrid World

证明合规性

证明合规性

证明合规性

这些功能结合在一起,使您可以建立、保持并证明对广泛法规的合规性。 此外,Quest解决方案提供智能、可扩展的日志压缩功能,让您可以经济高效地存储审核数据达数年,同时确保其可用于安全调查和审核检查。

阅读白皮书: Key Strategies for Meeting GDPR Compliance Requirements
阅读白皮书: A Practical Guide for GDPR Compliance
阅读白皮书: Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework

支持的平台

Featured Products
Change Auditor for Active Directory

快速跟踪和确认任何变化或日常系统修改

Enterprise Reporter Suite

简化基于Windows的企业中的安全合规性和报告

Recovery Manager for Active Directory Disaster Recovery Edition

Complete AD disaster recovery at the object, directory and OS level across the entire forest.

GPOADmin

控制并简化组策略管理。

Featured Products
Metalogix ControlPoint

可保護您的 SharePoint 環境,防範內部與外部威脅。

Metalogix Backup for SharePoint

可快速備份您的 SharePoint 環境,並還原敏感內容。

Change Auditor for SharePoint

实现更快、更方便、更安全的Microsoft SharePoint审核

Featured Products
On Demand Audit

透過單一主控操作介面,搜尋和調查在內部部署或雲端中所做的變更。

On Demand Recovery

SaaS 解決方案,可快速安全地備份及回復 Azure AD 和 Office 365。

Enterprise Reporter Suite

简化基于Windows的企业中的安全合规性和报告

On Demand Group Management

Regain peace of mind and control of Azure AD and Office 365 groups

Featured Products
On Demand Audit

透過單一主控操作介面,搜尋和調查在內部部署或雲端中所做的變更。

Enterprise Reporter Suite

简化基于Windows的企业中的安全合规性和报告

Featured Products
Change Auditor for Exchange

记录对Exchange的所有重要组、邮箱和公共/个人变更

Recovery Manager for Exchange

無須專用復原伺服器,即可輕鬆地快速復原 Exchange 與電子郵件資料。

Enterprise Reporter Suite

简化基于Windows的企业中的安全合规性和报告

Metalogix Archive Manager for Exchange

可自動封存、管理和保護貴組織的所有電子郵件。

Featured Products
Change Auditor for Windows File Servers

追蹤、稽核所有 Windows 檔案伺服器即時系統變更並接收相關報告

Enterprise Reporter Suite

简化基于Windows的企业中的安全合规性和报告

Change Auditor Threat Detection

在 Microsoft 環境中主動依據使用者行為偵測威脅

Metalogix Archive Manager for Files

可自動封存、管理和保護貴組織的所有檔案。

资源

检测、防范内部攻击并从内部攻击中 恢复
数据表
检测、防范内部攻击并从内部攻击中 恢复
检测、防范内部攻击并从内部攻击中 恢复
您已构建了出色的外围防御,但是是否为已在网络内部的威胁做好准备?
阅读数据表
Top 10 Security Events to Monitor in Azure Active Directory and Office 365
电子书
Top 10 Security Events to Monitor in Azure Active Directory and Office 365
Top 10 Security Events to Monitor in Azure Active Directory and Office 365

Is your organization really more secure now that you’re running applications in the cloud?

Don’t forget that users can still perform high-risk actions in the cloud, and account c

阅读电子书
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
白皮书
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
SIEM Integration Best Practices: Making the Most of Your Security Event Logs

Too many organizations limit the log data they collect because they can't afford to process everything their SIEM; it simply costs too much and generates far too many alerts. However, this decision

阅读白皮书
What Is Azure ATP and How Does It Fit into Your Security Strategy?
白皮书
What Is Azure ATP and How Does It Fit into Your Security Strategy?
What Is Azure ATP and How Does It Fit into Your Security Strategy?

Being able to quickly detect and respond to threats is essential for both security and regulatory compliance. But it’s not an easy task. On the one hand, you have hackers battering your netwo

阅读白皮书
Preparing for Attacks that Seek Total Annihilation
技术简报
Preparing for Attacks that Seek Total Annihilation
Preparing for Attacks that Seek Total Annihilation

Defending your IT infrastructure against attack has never been a simple task. But things have taken a decidedly ugly

阅读技术简报
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
白皮书
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
阅读白皮书
SharePoint Governance Best Practices
电子书
SharePoint Governance Best Practices
SharePoint Governance Best Practices

Collaboration platforms like SharePoint can add significant value to your organization — but the platform is of

阅读电子书
Quest On Demand ISO certification: committed to security standards
数据表
Quest On Demand ISO certification: committed to security standards
Quest On Demand ISO certification: committed to security standards
SaaS 解決方案,可快速安全地備份及回復 Azure AD 和 Office 365。
阅读数据表

博客

Top 10 Security Events to Monitor in Azure AD and Office 365 – [New eBook]

Top 10 Security Events to Monitor in Azure AD and Office 365 – [New eBook]

Learn about 10 places in your cloud environment that log important audit events. See how native tools fall short of ensuring your auditing compliance.

Drowning in alerts from your SIEM? Maybe you’re not using it right.

Drowning in alerts from your SIEM? Maybe you’re not using it right.

Learn about the importance of SIEM data collection and how to prevent your security team from being overwhelmed by alarms in this post.

M&A Security Series: Lessons learned from Equifax and Marriott data breaches (Part 2)

M&A Security Series: Lessons learned from Equifax and Marriott data breaches (Part 2)

In Part 2 of the M&A Security Series, we focus on two major examples of M&A IT integration security failures in Marriott and Equifax.

Are you prepared for today’s destructive attacks?

Are you prepared for today’s destructive attacks?

Prepare against cyber attacks and data breaches in the evolving threat landscape with a solid disaster recovery strategy and solutions from Quest.

立即行动

检测内部威胁。 保护您的外围。 从安全攻击中恢复。