STEALTHbits Activity Monitor 3.0 is here!

Increase Visibility. Reduce Dwell Time. Surface Meaningful Insights.

Request a Free Trial

Powered by ChronoForms - ChronoEngine.com

STEALTHbits Activity Monitor is an internal control that performs the act of validating how data is used, accessed, modified and reported on as part of Data Access Governance activities, the generation of Threat Analytics and the capturing of human and machine activity associated with data and applications.

STEALTHbits Activity Monitor 3.0 quiets the noise of activity logs permitting organizations to efficiently and intelligently record file access activities for security, compliance, and operational purposes. From extended Nansuni support to SharePoint activity monitoring – selective operations filtering to TCP connection for SYSLOG messages, STEALTHbits Activity Monitor 3.0 provides an increased level of operational and security intelligence, allowing analysts to focus only on the events that are important to their specific needs.

Some highlights of the new release include:

STEALTHbits File Activity Monitor - SharePoint Activity Monitoring

SharePoint Activity Monitoring

SharePoint is a monolithic product that tries to be all things to all people – it is a Web application, but you can also think of it as a collaboration tool, a document server or even a development framework. Not having insight into whether or not objects or security groups have changed, for example, is a major roadblock for organizations. The abstract and highly customizable nature of SharePoint is what makes it tough to secure.

This enhancement to STEALTHbits Activity Monitor offers the ability to scrutinize SharePoint activity by expanding the level of operational and security intelligence that is not available natively.

STEALTHbits File Activity Monitor - Nasuni Support

Nasuni Support

Regardless of storage platform, organizations need the ability to efficiently and intelligently record file access activities for security, compliance, and operational purposes.

Extending support for Nasuni Storage enables organizations relying on the platform to recognize all the benefits the platform can provide, without sacrificing the visibility they need to safeguard and manage their critical files.

STEALTHbits File Activity Monitor - TCP Support for Syslog

TCP Support for Syslog

When transporting mission critical data, we want to be sure that data has arrived safely and is delivered in a reliable manner. By using transport protocol (TCP) on the application level, that goal can be achieved.

STEALTHbits Activity Monitor 3.0 can be configured to use a TCP connection when sending Syslog messages to the Syslog Server. TCP ensures a reliable and ordered delivery of activity data, manages message acknowledgment and retransmissions in case of lost parts. Thus there is absolutely no missing data.

STEALTHbits File Activity Monitor - Selective Operations Filtering

Selective Operations Filtering

STEALTHbits Activity Monitor 3.0 can be configured to selectively capture only the file and folder operations that are of interest. The ability to specifically target activity operations allows analyst to focus only on the events that are important for their specific needs. Selective operations filtering also reduces the number of events forwarded to other systems, including SIEMs, reducing operational cost and increasing efficacy.

STEALTHbits File Activity Monitor - Microsoft Server 2016 Support

Microsoft Server 2016 Support

Support has been extended to Microsoft 2016 Server. Windows Server 2016 is the cloud-ready operating system that delivers new layers of security for the applications and infrastructure that power your business. STEALTHbits Activity Monitor 3.0 can now support file servers running on MS 2016 Server.

STEALTHbits File Activity Monitor - Filtering of Office Temp Files From Active Logs

Filtering of Office Temp Files From Active Logs

Office Temp files can be a source of noisy events, and can equally contain sensitive data making the monitoring of them necessary for some. STEALTHbits Activity Monitor 3.0 can be configured to filter Office Temp files from monitoring, allowing organizations to decide if they want to supervise these events. Removal of Office Temp files also reduces the number of events forwarded to other systems, including SIEMs, reducing operational cost and increasing efficacy.

Resources

STEALTHbits Activity Monitor

Data Sheet

Learn More

STEALTHbits Activity Monitor

Video

Learn More

Introducing STEALTHbits Activity Monitor 3.0 w/ SharePoint Monitoring

Webinar

Learn More