StealthAUDIT 8.1 is here!

STEALTHbits becomes the first Data Access Governance solution provider to support both unstructured and structured data repositories.

Request a Free Trial

Powered by ChronoForms - ChronoEngine.com

Data privacy and security is quickly evolving to be on equal footing with traditional security measures focused on the network, hardware, or software the data is contained within. Organizations aligning to concepts like Data-Centric Audit and Protection (DCAP) defined by Gartner, or the requirements of strict compliance regulations like EU GDPR, are looking to implement processes that help them understand where sensitive data is stored, who has access to the data, and what are users doing with their access privileges across unstructured and structured data sources. Additionally, the security of the infrastructure users are accessing this data from and the primary authentication and authorization mechanism leveraged to supply access to the data (Active Directory) is also critical regardless of the type of data in question.

Some highlights of the new release include:

Microsoft SQL Server Solution Set

Microsoft SQL Server Solution Set

As part of STEALTHbits’ comprehensive Data Access Governance suite for structured and unstructured data, StealthAUDIT for SQL automates the process of understanding where SQL databases exist, who has access to them, how they obtained access, who or what is leveraging their access privileges, where sensitive information resides, and how each database has been configured.

With visibility into every corner of Microsoft SQL Server and the Windows Operating System it relies upon, organizations can proactively highlight and prioritize risks to sensitive data. Additionally, organizations can automate manual, time-consuming, and expensive processes associated with compliance, security, and operations to easily adhere to best practices that keep SQL Server safe and operational.

Weak Password Identification

Weak Password Identification

Password strength is an important component of any organization’s overall information security strategy. Weak and default passwords make it exponentially easier for attackers to compromise accounts of all types, however, there are only a limited set of controls provided within Active Directory to prevent users from creating and leveraging weak passwords, even if they do meet strong complexity requirements.

With the ability to identify users leveraging passwords contained in publically available password dictionaries and organizationally-defined unapproved password lists, security personnel can proactively identify users most susceptible to successful brute force or password guessing attacks. Leveraging strong passwords across all accounts effectively mitigates the risk of security breach for the organization as a whole.

Expanded Threat Reporting

Expanded Threat Reporting

Microsoft and others have documented hundreds of ways in which attackers can exploit various conditions, misconfigurations, and the nature by which certain functions operate within Active Directory and Windows to compromise credentials, obtain unauthorized access to network resources, and achieve persistence within the environment.

StealthAUDIT’s catalog of threat reports provide organizations with a method to easily highlight the scenarios and situations they need to prioritize to safeguard their systems and accounts from compromise. As it’s difficult for any organization to keep themselves abreast of and protected from all the different vectors of attack bad actors are leveraging, STEALTHbits’ preconfigured solution eliminates the time needed to research these common threats, along with how to mitigate them via homegrown or 3rd party solutions.

Exchange 2010/2013 Sensitive Data Discovery

Exchange 2010/2013 Sensitive Data Discovery

Microsoft Exchange has been and continues to be one of the largest repositories of unstructured data within any organization. Sensitive correspondences, files, and information are all contained within Exchange, making mailboxes a prime target for attackers looking to obtain information that could be valuable and damaging to an organization.

With the ability to now discover where sensitive information exists within an organization’s Exchange environment, security professionals can pinpoint and remediate areas of risk proactively, before compromise occurs or data leaves the organization.

Published Report Role-Based Access Control (RBAC)

Published Report Role-Based Access Control (RBAC)

A new Report Viewer role has been created in StealthAUDIT to allow users to view the Report Index and individual reports. Report Viewers are able to view specific reports based on Active Directory User or Group assignments, designated at the root, job group, individual job, and report level.

Users can leverage StealthAUDIT’s built-in password vault or an encrypted text file to store credentials and account information, Admins can view which users can view each report, and protections apply to both the Published Reports website and node within the StealthAUDIT console.

File System Permissions, DFS, and Sensitive Data Discovery Results Streaming

File System Permissions, DFS, and Sensitive Data Discovery Results Streaming

Certain audit routines like file-level permission scanning and the discovery of sensitive data can take longer periods of time to complete, resulting in periods of delay before the data can be viewed and analyzed.

With the ability to now automatically stream the results collected during file system permissions, DFS, and sensitive data discovery scans to StealthAUDIT’s database, users can immediately begin reviewing and analyzing results, expediting remediation and reporting efforts.

Resources

StealthAUDIT for SQL

Data Sheet

Learn More

StealthAUDIT Expands to Structured Data and More with StealthAUDIT v8.1

Webinar

Learn More

Free Risk Assessment
Free Trial Request
STEALTHbits Demo Request
Browse Resource Library

For More Information: