StealthDEFEND 2.0 is here!

REAL-TIME THREAT DETECTION AND RESPONSE

Request a Free Trial

Powered by ChronoForms - ChronoEngine.com

For Active Directory and File Systems, StealthDEFEND 2.0 combines an enriched, optimized audit stream of activity with relevant contextual data to effectively build organizational behavioral profiles using unsupervised machine learning algorithms. The result is the ability to detect and respond to abnormal behavior and advanced attacks with unprecedented accuracy and speed.

SOME HIGHLIGHTS OF THE NEW RELEASE INCLUDE:

ACTIVE DIRECTORY ATTACK DETECTION

ACTIVE DIRECTORY ATTACK DETECTION

Active Directory attacks have garnered CISO-level visibility in recent years due not only to their pervasiveness, but effectiveness. Active Directory, for most users, is an invisible helping hand. However, because of the wealth of information contained within AD and the plethora of systems, applications, and data repositories that have been integrated and federated with it, AD has become the most ideal target for savvy attackers. StealthDEFEND has been specifically tuned to detect the most advanced attacks against Active Directory in real-time, drastically reducing time to detection and increasing an organizations’ ability to respond to these attacks quickly and efficiently.

USER BEHAVIOR ANALYTICS

USER BEHAVIOR ANALYTICS

The challenge with detecting many advanced threats is the ability to differentiate normal and abnormal activity. As attackers operate under the context of the accounts they’ve compromised, it’s highly challenging to detect suspicious behaviors unless glaringly significant deviations in activity force their way to the surface. This challenge is only exacerbated by a variety of inadequacies associated with native audit logging, including missing data, excessive noise, misunderstood event sequences, and lack of controls. With a deep understanding of Active Directory security, STEALTHbits has tuned StealthDEFEND and the highly enriched data feed it leverages to identify threats and abnormal activity with unprecedented accuracy, resulting in lower incidence of false-positive alerts which waste time and detract attention from legitimate threats.

WAUTOMATED CONTEXT TAGGING FOR SENSTIVE ACCOUNTS & RESOURCES

AUTOMATED CONTEXT TAGGING FOR SENSITIVE ACCOUNTS & RESOURCES

Security Analysts are challenged with an excess number of false-positive alerts from the myriad of tools they leverage. As time is a finite resource these teams can ill afford to waste, contextual awareness is needed to help identify what is truly meaningful in a stream of events.

By automatically identifying accounts, groups, and resources that are most sensitive, such as the members of the Domain Administrators group or servers facilitating the role of Domain Controller versus an application or file and print server, StealthDEFEND produces alerts that help admins respond appropriately according to risk.

NEW RESPONSE ACTIONS

NEW RESPONSE ACTIONS

The efficiency, speed, and accuracy in which security teams can respond to the wide variety of situations they face is often the difference between headline news and just another day at the office. Companies strive to automate all aspects of their business, as it provides predictable results and removes human error. StealthDEFEND’s actions engine allows for programmatic and automatic responses to the threats StealthDEFEND detects, driving required processes, facilitating desired workflows, and remediating issues efficiently, expediently, and with surgical accuracy.

Resources


StealthDEFEND for Active Directory

Data Sheet

Learn More