Monday, 16 June 2014 04:00

STEALTHbits Announces Version 2.2 of its Sensitive Data Discovery Solution, StealthSEEK Featured

Written by
Rate this item
(1 Vote)

HAWTHORNE, NJ, JUNE 16, 2014 – STEALTHbits Technologies Inc., leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today that version 2.2 of their Sensitive Data Discovery solution, StealthSEEK, has been released.

Data breach events are on the rise and the focus is on sensitive data. While many organizations have tight controls and substantial security around their critical applications, most have no concept of where critical and sensitive data such as credit card numbers, social security numbers, passwords and usernames, lives outside of their application databases.

StealthSEEK provides powerful and surgical sensitive data discovery for unstructured data residing on file systems across desktop, server, and NAS infrastructure, providing organizations the answers to critical questions: where is my sensitive data? who has access to it? and how do I remediate it?

With the growing popularity of Mac, being able to scan for sensitive data on just Windows File Systems is not an option. Version 2.2 allows organizations to scan Mac systems for sensitive content, increasing the value StealthSEEK brings to the business.

“StealthSEEK has seen tremendous growth since its inception in 2012.” said Kevin Foisy, Chief Software Architect for STEALTHbits. “We’re excited to bring several new features to our customers including Mac support. Scanning Macs is now as easy as scanning a Windows box. Additionally, users that want to step up their scans to an enterprise scale can develop and test their scan criteria with SEEK and with one click, feed that into our Data Access Governance engine for high volume scanning. We think this gives customers the simplicity they want coupled with enterprise class scanning and remediation workflows”

Additional 2.2 features and enhancements include:

  • Ad-hoc scheduling of scans

  • Faster scanning – a new option to scan only content that has changed since a specific date

  • Ability to delete files permanently from the file system using secure delete

  • DFS Support

  • Integration with STEALTHbits’ flagship product, StealthAUDIT, for enterprise class complete Data Access Governance – sensitive data discovery, effective access reporting, entitlement reviews and attestation.

StealthSEEK v2.2 is available worldwide June 16th, 2014. Pricing starts at $10 per User. Enterprise licensing is also available.


ADDITIONAL RESOURCES

For more information about StealthSEEK, visit http://www.stealthbits.com/products/stealthseek

For more information about STEALTHbits' Data Access Governance Solutions, visit http://www.stealthbits.com/data-access-governance


About STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we’ve been doing for over a decade.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit http://www.stealthbits.com/ for more information.

# # #

Media Contact:

Dan Chmielewski
Madison Alexander PR for STEALTHbits Technologies
Office +1 714-832-8716;
Mobile: +1 949-231-2965
This email address is being protected from spambots. You need JavaScript enabled to view it.

Additional Info

  • Title Tag: STEALTHbits Announces StealthSEEK 2.2, A Sensitive Data Discovery Solution
Read 3518 times Last modified on Monday, 09 January 2017 22:27

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.