Microsoft SharePoint Solutions
Support global deployments of Microsoft SharePoint (Secure, Availability, Performance)
|
|
> Know which components are being used and applying policies to those components to the six SharePoint functions including:
SharePoint
SharePoint-admin SharePoint-blog-posting |
SharePoint-calendar
SharePoint-documents SharePoint-wiki |
> Legal Search, eDiscovery, content tracking, Governance
> Protect SharePoint components (IIS, MS-SQL, ASP.Net) from serious threats such as SQL injection attacks and IIS buffer overflow attacks.
> Prevent information held within SharePoint from being exposed to theft or destruction. > Reign in unknown or rogue SharePoint deployments > Maintain Compliance > Implement a SharePoint governance policy > Microsoft TMG replacement solutions > Isolate and secure, SharePoint components > File Detection, Monitoring and Control |
> Specify what kind of information can be put on SharePoint
> Identify SharePoint Web applications that work with sensitive data > Detect and block malicious content hiding in file shares and SharePoint
> Protect SharePoint migrations
(transport and maintain user rights / policies in migration)
> Track the entire life cycle of Office 365 documents (read, emailed, or printed and by whom) |
Look beyond native SharePoint security features
Your SharePoint and Office 365 took off and people are using it.
But now that they are creating sites, lists, libraries and changing permissions on files and folders, how can you keep an eye on what's going on? On top of all this, how can you make sure your security is bulletproof?
Collaborate in Confidence
Microsoft SharePoint provides easy access to business-critical data through intranet, extranet, and public-facing applications. So when that information is sensitive or regulated, security is a major concern.
> Data Backup & Recovery
- Protect SharePoint data across any storage tier, including snapshots, disk, tape and the cloud.
- Application-aware hardware snapshots, for improved recovery-based service levels like RPO and RTO.
- Granular recovery of individual SharePoint documents, including different versions of files, sites, sub-sites and lists.
- Ensure continuity with coordinated farm, site, doc, blob backup
- Optimise SharePoint with integrated blob externalisation
- Drive efficiency with blob archive to lower cost storage tiers
> Data Storage Platforms
Optimised for Microsoft SharePoint
|
|
> Compliance
Enable SharePoint governance
- Apply retention and deletion policies to archived SharePoint content.
- Data Segregation: Meet data governance mandates by segregating data repositories so that departments or entities can only see data they own and not adjacent data.
- Expire sites when projects are completed but archive and retain site content for governance and compliance.
- Enable rapid search and eDiscovery for internal audits and legal purposes.
- Track and audit user activity and changes to SharePoint (who, what, when, where, and from which workstation).
- Send critical alerts via email or to mobiles so you can respond faster to incidents or threats.
- Tamper-proof, SSAE-16 certified
> SharePoint Security
End-to-End security
Identify and controls six different SharePoint elements including:
- SharePoint,
- SharePoint-admin,
- SharePoint-blog-posting,
- SharePoint-calendar,
- SharePoint-documents,
- SharePoint-wiki.
With this knowledge of which components are in use, IT can make a more informed decision on how to protect SharePoint and the users. Of the SharePoint features currently identified, the application usage and risk report shows that SharePoint and SharePoint-admin were most commonly detected.
SharePoint Security Solutions Features & Benefits
> Data Loss Prevention
> Encrypt Connectivity SSL VPN
> Protect SharePoint data on Endpoints
Secure Collaboration
> Web Application Security &
Firewall
> Signature Database of thousands of Applications
> Vulnerability Detection & Protection
> Proactively
monitor, diagnoses any issues, and speeds up the troubleshooting process.
> Virtual Patching
> Server Patch
Management
(physical and virtual platforms)
> Access and content management for mobile
device
> Privileged
Identity / Password Management
|
> Anti-Viruses,
malware, adware and spyware
> Malicious file scanner prevent malware getting access into
SharePoint (viruses, rootkits, worms and spyware)
> Behaviour-based detection covers that crucial gap
between the first appearance of new malware and the first signature detection
being issued for the threat.
> SSL offloading of
intensive CPU transactions from the SharePoint
> Application Performance
and Security Testing
> Two factor / pin code
authentication
> Data loss prevention
> Data / File
Archiving
> Content filtering / control
scan files residing or coming to SharePoint Database, and filter,
block or inform users based on file types or text keywords.
> Sandbox Malware Detection
Detect malware hidden within seemingly safe files or traffic content.
|
> Encryption
- Data in transit and at rest
- Database encryption
- Encryption: File and Database (on the fly: based on policy or document content identification)
- Encrypt data within SharePoint Servers, in transit and at rest (mobile devices)
- Encryption key management
> Firewall
Controlling application access addresses only a small part of the SharePoint security challenge. An equal or greater challenge is addressing the specific threats that are targeted at SharePoint environments. If SharePoint itself were the only element to protect, then the task would be relatively straightforward. However, SharePoint relies on IIS and in many cases, MS-SQL which means that the exposure to vulnerability exploits is significantly higher.
- Vulnerability Exploit Protection: Firewall threat prevention detects and blocks vulnerability exploits that target SharePoint and the supporting applications.
- Data filtering: can be added that monitors SharePoint traffic for unauthorised transfer of confidential data. Files based on file type (as opposed to looking only at the file extension) and confidential data patterns (credit card and social security numbers) can be detected and blocked based on policy.
- Isolate the SharePoint components: (SharePoint, IIS, MS-SQL) using security-zones and apply policies that dictate which users can access those components.
- Segmentation: segmentation by application, user and content. It identifies all traffic sent to the Microsoft SharePoint servers, based on actual application, not just port or protocol.
- Data Center Segmentation: In a standard SharePoint implementation, there are multiple Sharepoint server roles, including web servers, database servers, search service and other service application roles. In small deployments, some of these services may be combined on a single server, but in large-scale enterprise deployments, there will be multiple servers dedicated to each role. In order to properly segment and secure the SharePoint implementation, the different server roles will be isolated in dedicated security zones that can only be accessed by authorised users with authorised applications.
> Application Control
Policy decisions including appropriate usage, content inspection, logging and reporting.
- Web 2.0 threats
Web 2.0 applications: such as Facebook, Twitter and Skype.
- Block Malicious Content
- Identify and restrict application usage at a granular level
- End-user association,
- Application classification
> Access Control
|
|
- Privileged User Rights Management
Allow elevated rights for some users, but prevent unauthorised application access from hackers or other internal users.
- Wired, wireless, mobile and cloud access control: Policies can be deployed that enable/disable use of key SharePoint functions (SharePoint, SharePoint-admin, SharePoint-blog-posting, SharePoint-calendar, SharePoint-documents, SharePoint-wiki).
- Context based user / application access control (user and component rules, user device, O/S version, time of day, geographical location, security patch levels)
- Endpoint security and posture checks / Integrity-checking ensures network protection by allowing organisations to tie user access to endpoint compliance, including checks for anti-virus, anti-spyware, firewall software, and many other device attributes.
- Session clean up removes all traces of access from the endpoint, including cache cleaning, history removal, file deletion and more, to protect against unintended data leakage and unauthorised access.
- Support for third-party authentication methods, including true two-factor SMS and web keypad authentication, Active Directory, and onboard LDAP, ensures only authorised users have access.
|
|
> Data Archiving
|
|
> eDiscovery
Discover and classify information across a SharePoint.
- Identify and finger print messages, documents and files.
- Search across backup and archive data sets for straight forward compliance and legal hold activities.
- Cloud-based solutions offers high speed search, review, and export of email, files and documents.
Optimise Application Delivery & Performance
Enhance User experience is through faster response times
Performance Monitoring
Get ahead of SharePoint latency issues
- Troubleshooting
- Easily pinpoint whether issues in your SharePoint server are caused due to the network, server hardware, database, etc.
- Monitor application availability and performance by drilling into the number of concurrent users accessing the application.
- Identify latency issues that originate due to web transactions by having visibility across infrastructure layers
- Get detailed metrics for each component in SharePoint, such as SharePoint services, user requests, usage, and more
> Load Balancing
Centralise SharePoint Server Performance & Monitoring - database issue visibility
SharePoint leverages HTML front ends, HTTP and SSL protocols to blend intranets with web content management and document management systems.
Challenge
|
Solution
|
|
|
> Application Acceleration
Ensure Remote Collaboration in Real Time without performance frustrations.
- WAN optimisation
- Application Optimisation
- Latency reduction for best user experience
> Application Testing
Easy, cost effective application user experience testing. Test Performance and Security.
> Cloud / Hosting Services
Solves SharePoint Sprawl and Custodial problems
> Hosted SharePoint - Hosting
- Cloud application hosting
- Managed SharePoint lets you to leave the pain of administration, the worry of security, and the hassle of upgrading and patching behind.
- Tamper-proof, SSAE-16 certified datacentre
> Hosted / Cloud Archiving
- Governance solution for networked file shares, Microsoft SharePoint, Lotus Notes, and other content repositories.
- Enabling enterprises to detect, manage, respond to, and control ever-growing file counts.
> Cloud-based e-Discovery service
> Reporting, Tracking, Log, Audit and Compliance
Make it simple to collect, monitor, and analyse SharePoint logs quickly and easily.
- Event Monitoring / Log Information Intelligence : gain control of log data, accelerates time to insight.
- Use real-time SharePoint event log correlation to immediately troubleshoot and investigate security breaches.
- Health and performance metrics for all tiers of the application delivery chain - network, web, VDI, middleware, database, and storage.
- Who owns this data?
- Who accessed this data? - When and what did they access? - Have there been repeated failed login attempts? - Audit policy change |
- SharePoint site
collection administrator
- Member added - Unique permissions - Permissions changed and - Permission level modified. |
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
| ![]()
info@securenetconsulting.co.uk
|