StealthAUDIT’s Sensitive Data Discovery capabilities have been extended to include Nasuni UniFS, NFS-formatted File Systems on Unix, Linux, and NAS platforms, Dropbox, Exchange 2016 and Exchange Online.
Sensitive data can be and likely is littered across every corner of an organization’s network, within files shares on Windows, Unix, Linux, NAS and SAN devices, SharePoint Sites on-premises and in the cloud, Exchange Mailboxes, Enterprise File Sync & Share applications, databases, and more. Locating and securing this sensitive information can be impossible without the right tools, putting organizations at risk of data breach or compliance failure if left unaddressed. StealthAUDIT’s Sensitive Data Discovery solution for unstructured and structured data repositories has been enhanced to provide support for a wider variety of platforms than ever before, making finding the data that’s putting you at risk easier than it’s ever been as well.
StealthAUDIT’s File System solution now supports the collection of permissions, activity, and sensitive data information from the Nasuni UniFS platform.
Enterprises across every industry are turning to Hybrid NAS vendors like Nasuni to help them overcome challenges associated with data growth, cloud adoption, and data accessibility. With the addition of support for Nasuni UniFS, StealthAUDIT users can ensure the data contained within their Nasuni Hybrid-NAS environments is understood, monitored, and governed properly with in-depth permissions assessment, activity monitoring, and sensitive data discovery capabilities.
The Access Information Center (AIC) now provides native support and reporting for Microsoft SQL Server permissions, activity, and sensitive data information, as well as Active Directory object permissions. Understanding any user’s full scope of entitlements across one or multiple data repositories is highly challenging in organizations of virtually any size.
Within the AIC’s search engine-like query interface or with just a couple of clicks, administrators and auditors can understand access entitlements and risk information across not only unstructured data platforms, but structured repositories and Active Directory, the mechanism that supplies access to virtually all data.