If your IT security folk tell you they need to strengthen your network perimeter, they are probably right. If they tell you that is all they need to do, they are probably wrong. Far too many companies are being hacked because someone stole valid credentials from an employee or a partner’s employee. As I mentioned earlier, in 2011 Lockheed Martin suffered a serious data breach of confidential defense and proprietary information because Chinese government hackers were able to steal credentials from an employee of a partner’s parent company.
Your own employees and contractors are also a security risk. After all, you have given many of them access to your sensitive information, including information protected by laws and regulations. As you move more to the Cloud and BYOD (bring your own devices), you have wittingly or unwittingly opened your network to devices and locations you cannot monitor nor control. Either by intent (e.g., Edward Snowden) or by accident, these employees or contracts could suddenly expose your information.
You can’t tell whether the credentials are used by the person you gave them to, or are being used by someone who has stolen them. In any case, if they are doing something strange, you better find out about it quickly.
The bottom line: securing content with access controls alone is not sufficient in the current threat environment.
Microsoft SharePoint is a web application platform in the Microsoft Office suite that combines content management, document management, business intelligence, workflow management and an enterprise application store across local, wide-area, and Internet-based networks. SharePoint is used by many mid-sized companies and large departments within larger companies. As of 2013, 80% of Fortune 500 companies use it, and Microsoft was adding 20,000 users every day.
If you use SharePoint either in the Cloud or just within your own datacenter, you should look at Metalogix ControlPoint. Announced on November 2, 2015, ControlPoint 7.0 adds real-time situational awareness into suspicious SharePoint user activity. ControlPoint 7.0 introduces a learning detection engine that analyzes user behavior for suspicious activity, and automatically takes action when it finds suspicious activity patterns.
Consider an employee who works primarily from the office and sometimes from home largely during normal business hours, and who looks at about a dozen sensitive documents on an average day. You might like to know if it appears like that employee is downloading hundreds of documents at 2:30 in the morning from what looks like a Chinese IP address. Actually, any of the attributes of that access are suspicious. This is the kind of activity that ControlPoint 7.0 is looking for.
ControlPoint 7.0 features and benefits:
- Mitigates the risk of data loss due to unauthorized access to content, whether by an employee, contractor, or through the use of stolen credentials.
- Provides audit trails of content access.
- Provides details of content growth and user activity.
- Provide automation of governance policies.
- Minimizes security breaches.
- Meets compliance requirements for access control.
- Anticipates future IT needs for growth.
- Eliminates human error with policy driven security across SharePoint farms.
Right out of the box, ControlPoint 7.0 will provide significant security benefits. It will take it probably two or three months to learn the behavior of your users; the sooner you start the lower your risk.
Metalogix is a Washington DC-based software company founded in 2001. Metalogix provides a unified platform to manage the entire lifecycle of SharePoint users and their collaboration content centered around optimization, security and management. In 2013, it acquired Axceler’s SharePoint business including ControlPoint for SharePoint. MetaLogix continues to put significant resources into enhancing and supporting ControlPoint; ControlPoint 7.0 follows the release of 6.0 just seven months earlier.
The last word:
Keep your sense of humor.