HAWTHORNE, NJ, JUNE 9, 2014 – STEALTHbits Technologies, Inc., leading supplier of software solutions for managing and securing unstructured data and critical applications, today announced the version 3.0 release of their real-time security interception product, StealthINTERCEPT. StealthINTERCEPT is the security auditing and enforcement arm of the STEALTHbits Active Directory management suite, in addition to File Systems and Microsoft Exchange Server.
Organizations that are awakening to insider threats require controls to meet audit and compliance requirements. StealthINTERCEPT provides an unprecedented level of visibility into security threats like brute force attacks, malware account hijacking, and data theft. By intercepting events in real-time at the lowest possible level (the operating system security authorization layer), StealthINTERCEPT provides:
- Deeper insight into security events than otherwise possible
- Low overhead, highly efficient security auditing
- Organizational policy enforcement, overriding even administrator level control
New for version 3.0, StealthINTERCEPT provides a new “Investigations” feature that allows security admins the ability to explore enterprise wide events and surfacing patterns of activity that would otherwise be missed. Additional features for version 3.0 include:
- SIEM integration with all major SIEM vendors for “single pane of glass” view that enhances the risk analysis conducted in SIEM through a new Advanced Threat Detection (ATD) framework
- Support for Exchange 2013 non-owner mailbox auditing
- Integrated self-auditing to prove compliance to auditors
- Windows integrated security for enhanced administration and control
- Automated Agent management, deployment and control
As Oliver Rochford, Research Director, Gartner Inc. & Kelly M. Kavanagh, Principal Research Analyst, Gartner Inc. state in the March 12, 2014 report Using SIEM for Targeted Attack Detection, “There is a need to monitor the activities of everyone who has privileged levels of access to the organization's systems and data to discover internal threats and to discover the postbreach activities of a successful targeted attack.” They go on to write, “This need to acquire higher privileges is an Achilles' heel for an attacker. It inevitably generates noise that can give them away.”
StealthINTERCEPT v3.0 is available worldwide June 9th, 2014.
Kyle Kennedy, Chief Technology Officer, STEALTHbits Technologies, Inc.
“The capabilities we’ve built into StealthINTERCEPT v3.0 drastically increase the risk context any organization’s SIEM application can consume compared to native logging. In particular, our ability to monitor privileged user activity in real-time and at greater depths than is otherwise possible will not only provide better data for advanced threat detection, but make it significantly harder for attackers to obtain higher levels of privilege without being detected.”
For more information StealthINTERCEPT, visit http://stealthbits.com/products/stealthintercept
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we’ve been doing for over a decade.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit http://www.stealthbits.com/ for more information.
# # #
Madison Alexander PR for STEALTHbits Technologies
Office +1 714-832-8716;
Mobile: +1 949-231-2965