StealthAUDIT 8.0 is here!

Resource-Based Groups | Active Directory Permission Analysis

StealthAUDIT 8.0 is the biggest advancement in Data Access Governance, with the focus on automating controls, advanced Active Directory (AD) visibility, and expanded interoperability. The addition of our new resource-based group provisioning workflow, StealthAUDIT 8.0 users can now automate the implementation of least privileged access across their unstructured data at scale. We also introduced AD permissions analysis to give unprecedented visibility into who has access to what within AD. In StealthAUDIT 8.0, customers will be able to leverage Optical Character Recognition (OCR) to discover sensitive data within images and PDFs. StealthAUDIT 8.0 also includes expanded cloud support with the addition of Box and exciting technology integrations with both CyberArk and Boldon James.

 

Some highlights of the new release include:

Automated Resource-Based Groups

Starting with a clean and consistent permissions model is critical to the success of any Data Access Governance initiative. A Resource-Based Group model is the easiest to manage and most suitable for facilitating entitlement reviews and self-service access requests. Provisioning new groups, populating their memberships, and cleaning up ACLs no longer needs to be an arduous, manual process. StealthAUDIT automates the entire process to facilitate effective governance at scale.

Local Admin Entitlement Reviews

Managing local group memberships through the STEALTHbits’ Access Information Center (AIC) extends the ability for organizations to certify, grant, or remove local administrative access rights. This capability closes a gap that many Windows systems have which is the inability to manage resources that are not Active Directory integrated. Business units will find managing access across Windows systems more seamless than native capabilities allow.

Sensitive Data Results Search

With enhanced abilities to quickly and easily search sensitive data found across their unstructured data repositories through the AIC, organizations can now more easily comply with the EU General Data Protection Regulation (GDPR), such as the “right to be forgotten” and the Data Subject Access Request (DSAR) process.

Stale Permissions Identification

Removing unnecessary access drastically reduces an organization’s attack surface. A security or compliance user can now view and act on this information from the AIC web interface, eliminating the need for thick-client access.

Optical Character Recognition Support

Scanned documents and other image files often contain confidential or regulated information. StealthAUDIT has been enhanced to scan these files ensuring this content is discovered, governed, and secured.

Data Classification (File Tagging)

Unclassified, legacy documents represent a significant barrier to Data Loss Prevention (DLP) and classification initiatives. StealthAUDIT solves these problems by automatically tagging files based on any available context such as data sensitivity and ownership.

File Archiving Workflow with Stubbing

StealthAUDIT now makes it even easier to automate retention policies with no disruption to the business. File stubs or shortcuts are left behind to ensure end users can still access files that have been archived or moved.

Box Support

Scanned documents and other image files often contain confidential or regulated information. StealthAUDIT has been enhanced to scan these files ensuring this content is discovered, governed, and secured.

Active Directory Permissions Analysis

AD, Security, and Network Administrators can easily browse and compare information from individual or multiple domains to obtain the most authoritative view of who has access to what in AD. StealthAUDIT provides a comprehensive, preconfigured analyses and reporting focused on any and all AD objects.

Active Directory and Windows Security Best Practice Reports

STEALTHbits has engineered a powerful set of security best practice checks across your Windows infrastructure. The reports provide clear insight into the security stature of some of the most critical configurations within AD and your Windows Server infrastructure; configurations every attacker aims to exploit.

Integration Features:

CyberArk Integration

Organizations leverage CyberArk Application Identity Manager™ to secure, rotate, and control access to privileged accounts and passwords used to access resources throughout the enterprise IT environment. Due to the sensitive nature of the information StealthAUDIT collects and its need for privileged account credentials to access the information and systems required, the ability for organizations to leverage both their investments in CyberArk and StealthAUDIT securely supports their efforts to leverage privileged accounts properly.

Boldon James Integration

Systematically classifying new and legacy data provides visibility and efficiencies that have broad reaching impact on an organization’s security program. The context and value data classification brings to other technologies and initiatives like Data Loss Prevention (DLP), Security Information and Event Management (SIEM), User & Entity Behavior Analytics (UEBA), and Identity & Access Management (IAM) strengthens each program’s effectiveness and the security of an organization’s data, wherever it resides.