Oracle Auditing & Reporting
A new Oracle solution is available, offering the ability to collect and report on permissions, activity events, sensitive data, and configuration related information within an organization’s Oracle database environment.
Data privacy and security applies to all types of data in all the places it can be stored. Much of the most sensitive data within any organization originates from or resides within database platforms like Oracle – especially for mission-critical applications in the world’s largest enterprises. As part of STEALTHbits’ comprehensive Data Access Governance suite for structured and unstructured data, StealthAUDIT for Oracle automates the process of understanding where Oracle databases exist, who has access to them and how, who or what is leveraging their access privileges, where sensitive information resides, and how each database has been configured. With visibility into every corner of their Oracle databases, organizations can proactively highlight and prioritize risks to sensitive data, including unauthorized access, access overexposure, and critical security misconfiguration. Additionally, organizations can automate manual, time-consuming, and expensive processes associated with compliance, security, and operations to easily adhere to best practices that keep Oracle databases safe and operational.
The File System data collector has been enhanced to collect AIP Protection labels and scan for sensitive data within files protected by AIP.
Microsoft Azure Information Protection (AIP) has quickly become one of the most widely used data classification and protection solutions for file data within enterprises of all sizes. While AIP provides enterprise-class encryption capabilities, it lacks the ability to provide Administrators with a consolidated view of their sensitive data footprint across their Microsoft and Non-Microsoft platforms, both on-premises and in the cloud. In StealthAUDIT v9.0, users can now collect AIP Protection labels and scan for sensitive data within files protected by AIP across file systems on Windows, Unix, Linux, and NAS platforms. With cross-platform visibility into where protected and unprotected sensitive data resides, organizations are better equipped to make decisions regarding user access rights, demonstrate compliance with various standards, and mitigate the risk of data breach.
Third party applications can now integrate with StealthAUDIT via a new REST API, which allows for querying of StealthAUDIT’s backend database for collected data
Representational State Transfer (REST) web services have become the de facto mechanism for integration in the web application world in which we live. Built to be flexible and extensible, REST API’s allow for interoperability between virtually any modern technologies quickly, easily, and at scale. StealthAUDIT has always provided robust capabilities to support interoperability, and with v9.0, users can now leverage a new REST API to facilitate integrations and automate manual processes. This initial version focuses on supplying users with access to any of the data contained within StealthAUDIT’s database, allowing organizations to create and maintain powerful data views to drive workflows and decision-making processes.
Windows Security Enhancements
File System Enhancements