HOW MANAGEDMETHODS WORKS
If you have found yourself on this page, you're probably wondering how exactly does ManagedMethods work. This guide will go into detail explaining how we get information from your environment, and how we use to to provide visibility into your environment.
High Level Overview:
At a very high level ManagedMethods uses API's to gather information from your chosen cloud environment. Once connected your environment we are notified of events within the environment (Login activity, file creation, emails sent, etc). We then collect those notifications, filter them for sensitive information and provide them in an easily digestible interface.
What is an API?
Application Programming Interface, or API for short is a set of protocols, definitions, and tools for communication with an application. Boiled down even further its simply a way to ask an application (Say G-suite) a question, and have it return an answer.
Limitations Of ManagedMethods:
When looking at security solutions you will frequently run into the phrases "in-line" and "out of band". Some solutions will be "in-line" solutions, and some will be "out of band". ManagedMethods is out of band.
IN LINE:
An in-line security solution is an appliance or gateway that your networking traffic is directly routed through. In-line appliances work as network filters that can block information in flight, stopping it from being transferred. In-line appliances and gateways typically have very involved setup processes, with configuration often being necessary on all devices used to connect to your environment.
Pros:
Block Traffic in Flight
Full packet Visibility
Decryption
Cons
User Interruption
Setup Time
Cost of Appliance
Can Break Entire Network
OUT OF BAND:
Out of band solutions do not need to be directly in the path of traffic, and instead sit outside your environment and listen. The advantage here being that setup times are minimal, and there is zero interruption to users. Rather than block traffic in flight, retroactive action is taken. Since we get most information about your environment in next to real time, we can delete files or emails, revoke shares, suspend users etc within seconds of an event taking place.
Pros:
Ease Of Setup
No Appliance Cost
Cannot Break Network
No User Interruption
Cons
Cant Block In Flight Traffic
Can't Decrypt
Can only see what API Provides.