Within days of deploying Northern’s software, utilizing the standard configurations, this customer was able to identify and then remedy serious misuse of highly populous built-in AD security groups – misuse that left over one million folders (2% of their total folder count) open to vast numbers of authenticated, and in some cases unauthenticated, users.
The inclusion of Security Principles such as Everyone, Domain Users, and Authenticated Users in NTFS permissions configurations creates massive internal attack surfaces, and this is an all too common oversight. In response, Northern continues to expand the capabilities of its benchmark data management solution to allow organization to not only analyze, understand, and respond to the type of content being stored, but also to the access configurations around this data.
The ability to analyze your semi- and unstructured data footprint is fundamental for its security. Northern’s software provides an end-to-end solution allowing you to present the data to the relevant stakeholders, take actions such as move or quarantine and measure the level of success. With Northern, organizations are able to reduce the cost and risk of their semi- and unstructured data footprint, across all their data repositories, both on-premise and in the cloud.