Blackbird is a world leader in Windows system management. It helps organizations tighten security controls, demonstrate compliance and drive efficiencies that decrease the cost of IT management. Our extensible and lightweight architecture is the foundation of our integrated approach. Their growing suite of modules is integrated within a single platform and enables proactive management, recovery, and auditing across identities, systems and data.
THE BLACKBIRD MANAGEMENT SUITE
ONE PLATFORM. ONE CONSOLE. ALL THE ANSWERS YOU’LL EVER NEED.
Data is critical to the existence of all companies. And, despite the fact that no company has unlimited resources for the task, no effort can be spared to ensure that it remains robust and secure. Key to that robustness and security is the Active Directory (AD), where the identity, location, and access rights of all users and resources are stored and maintained.
However, native AD functionality just isn’t enough for network administrators and IT managers who must cope with the growing demands placed on them throughout the identity and access lifecycle. And, the demands of managing users’ access to resources and enterprise applications is only part of the picture. Data governance, compliance requirements, and operational pressures all add to the complexity and urgency to administrators’ jobs. Their most critical task is ensuring that no unauthorized changes are made to Active Directory or the Windows File System.
They need fast, easy, and accurate answers to four critical questions:
WHO made changes?
WHAT changes were made?
WHERE were changes made?
WHEN were changes made?
And, administrators need to protect critical objects and network data by preventing changes and quickly restoring those resources before damage occurs.
The answer is the Blackbird Management Suite, a SIMPLE, EFFICIENT, and POWERFUL set of fully integrated tools within a single unified architecture that provides full integration and a single easy-to-use UI.
Our modular architecture ensures that all the Blackbird Management Suite modules work with each other seamlessly and work with your environment flawlessly. This accelerates implementation, ensures reliability, and reduces the total cost of ownership.
The unique Blackbird Management Console is our single and easy-to-use UI for All Blackbird Modules. Through the automation of management tasks and advanced reporting features, it lessens the risks associated with running Active Directory, reduces training and deployment costs, and speeds up reporting.
Blackbird Technical Superiority
A Single-Agent Or No Agent at All—You Decide
With Blackbird, you’ll never need more than one agent. All Blackbird Management Suite modules that require an agent make use of the same agent. So. adding modules is fast, easy and reliable, without the overhead of a new agent for each new feature.
Ease of Deployment
One modular architecture, one centralized database for all activity, one agent, and one console mean deployments are fast and trouble-free.
Modularity and a single platform give the Blackbird solution unparalleled flexibility. Any activity or file permission can be tracked, managed and protected from a single console. Buy only the modules you need now and plug in new modules as you need them—without interrupting workflow.
Our modular architecture means that the Blackbird solutions can easily scale up to any size environment, even is your organization has millions of users and thousands of servers spread across the globe.
BLACKBIRD AUDITOR FOR ACTIVE DIRECTORY
REAL-TIME CHANGE TRACKING AND SECURITY COMPLIANCE FOR YOUR ACTIVE DIRECTORIES AND GROUP POLICIES
A single change to Active Directory (AD) and Group Policy configurations can endanger your entire organization, affecting productivity, risking security breaches, and threatening non-compliance. However, built-in Active Directory auditing tools are cumbersome and lack centralized auditing and reporting capabilities. Analysis of native security logs requires enormous resources and still fails to show the entire scope of Active Directory (AD) activity. Blackbird Auditor provides a new level of centralized control and ease to AD auditing and compliance. This powerful solution monitors Active Directory and Group Policy in real time—tracking the “WHO, WHAT, WHERE, WHEN” for every change.
BLACKBIRD AUDITOR FOR FILE SYSTEM
REAL-TIME AUDITING AND SECURITY COMPLIANCE FOR FILE SYSTEM
Your company’s file system contains critical business resources, intellectual property, and other sensitive information. A single unintended change or case of inappropriate access can put your entire organization at risk, affecting productivity with service interruptions and risking the loss of corporate secrets, costly security breaches, and non-compliance. Yet, native auditing tools place unnecessary overhead on the server and are cumbersome, requiring enormous resources to search through vast amounts of audit entries. And, the lack of centralized auditing and reporting prevent you from seeing the full scope of your file system activity.
Blackbird Auditor for Windows File System enables tighter security and control over File System resources across the enterprise. It provides real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes. Administrators can instantly know the “WHO, WHAT, WHERE, WHEN” for every access and change event, and schedule reports for data owners to show them who is accessing and modifying their data.
BLACKBIRD AUDITOR FOR EXCHANGE
REAL-TIME AUDITING, INTERACTIVE ANALYSIS, ALERTING, AND COMPLIANCE REPORTING FOR MICROSOFT EXCHANGE
Auditor for Microsoft Exchange tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log. The integrated solution provides a centralized, real-time audit database for reporting and alerting against all Exchange activity including administrators, users and non-owner mailbox access for compliance and tighter security controls. This powerful solution monitors your Exchange environment in real time—tracking the “WHO, WHAT, WHERE, WHEN” for every change.
BLACKBIRD AUDITOR FOR SQL SERVER
REAL-TIME AUDITING, INTERACTIVE ANALYSIS, ALERTING, AND COMPLIANCE REPORTING FOR MICROSOFT SQL SERVER
A single change can put your critical applications and data at risk—affecting productivity, risking security breaches, and threatening non-compliance. Yet, built-in SQL Server auditing capabilities are cumbersome, cryptic, and lack centralized auditing and reporting. Careful analysis of distributed logs requires enormous resources and still fails to paint the entire picture of SQL activity. Blackbird Auditor for SQL Server brings a new level of centralized control and ease to SQL Server auditing and compliance. This powerful solution monitors all SQL Server activity in real time—tracking the “WHO, WHAT, WHERE, WHEN” for every change.
BLACKBIRD RECOVERY FOR ACTIVE DIRECTORY
THE ONLY CONTINUOUS RECOVERY OPTION FOR ACTIVE DIRECTORY, WITH UNMATCHED CHANGE CONTROL AND EASILY ROLL BACK TO ANY PREVIOUS STATE
Advanced Continuous Data Protection (CDP) makes Blackbird Recovery for Active Directory the most advanced solution there is. All changes to the AD are stored in a centralized continuous change log, allowing administrators unparalleled visibility and change control.
Our Continuous Object Recovery capability is unique and powerful. With Blackbird Recovery for AD, you no longer have to rely solely on scheduled, system-state backups if something goes wrong and needs to be recovered. Blackbird backs up only the changes to critical objects, allowing you to focus your recovery efforts on just those affected objects and attributes.
This means your backups can be significantly faster than before and use far less of your storage capacity. You database remains small and you can schedule far longer retention times for your backed up data, allowing you to optimize your storage resources.
BLACKBIRD PROTECTOR FOR ACTIVE DIRECTORY
REAL-TIME PROTECTION AND AUTOMATED POLICY ENFORCEMENT FOR ACTIVE DIRECTORY
Blackbird Protector provides real-time protection and automated policy enforcement for Active Directory. It locks down the critical parts of your Active Directory and protects them against unauthorized changes and deletions—even by a user with native access.
Even users and administrators who are authorized to make changes to critical objects and GPOs in the AD must follow strict policies designed to protect critical objects and GPOs from tampering and accidents. Only Blackbird protector allows you to automate the protection of your AD, with easily created policies and real-time alerts.
BLACKBIRD PRIVILEGE MANAGER FOR ACTIVE DIRECTORY
AUTOMATED POLICY ENFORCEMENT FOR NETWORK RESOURCES
Protecting data and preventing unregulated access to network resources is vital for any enterprise, particularly given the increased focus on IT security and regulatory compliance. Faced with these increased demands, companies need a flexible way to ensure that authorized employees, customers and partners can access the resources they need.
Blackbird Privilege Manager adds workflow-based governance for Active directory. This enables data owners to control access and make changes to their data resources without disruption of network and business activities.
BLACKBIRD PRIVILEGE EXPLORER FOR ACTIVE DIRECTORY
CENTRALIZED VIEW AND MANAGEMENT OF ENTERPRISE WIDE ACTIVE DIRECTORY ACCESS
Understanding who has access to Active Directory (AD) and File System resources is critical to any security or compliance initiative. Blackbird Privilege Explorer for Active Directory automates the process of security analysis and reporting, providing a scalable and cost-effective way to manage network resources across the enterprise.
Blackbird Privilege Explorer for Active Directory offers a centralized view of access and privileges, so administrators know who has access to which resources and can see the exposure of your company’s sensitive information and intellectual property. With Blackbird Privilege Explorer for Active Directory, you can be sure that users have access to the resources they need to do their jobs, and only those resources.
BLACKBIRD PRIVILEGE EXPLORER FOR FILE SYSTEM
KNOW EXACTLY WHO HAS ACCESS TO WHICH RESOURCES
Understanding who has access to Active Directory (AD) and Windows File System resources is critical to any security or compliance initiative. Blackbird privilege explorer automates the process of security analysis and reporting, providing a scalable and cost-effective way to manage network resources across the enterprise.
Privilege Explorer offers a centralized view of enterprise access, ensuring that the right people have access to the right resources, which will minimize data theft, security breaches, or system attacks.
BLACKBIRD EVENT VAULT
CONSOLIDATE, ANALYZE, COMPLY
Centralized collection and management of all event log data.
Managing Windows event log entries used to be difficult. The distributed nature of event logs made searching and securing entries tedious and frustrating. But, operations, risk management, and security teams need that information in order to do their jobs.
Event Vault automates and streamlines the collection and management of standard Windows event logs from Windows 2000 through Windows Server 2008 and Windows 7 and provides scalable and flexible centralized storage in the Blackbird SQL Server database.
Blackbird Event Viewer provides customizable views, filtering, sorting, and exporting options for all captured events. As with other Blackbird Management modules, all tasks are handled in the familiar Blackbird Management Suite Console.