Presentation on Thursday, January 8 will Highlight How STEALTHbits Products Could Have Significantly Mitigated Damage
HAWTHORNE, NJ, January 6, 2015 – STEALTHbits Technologies Inc., leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management, announced today that it will host a free webinar discussing the Sony breach and STEALTHbits’ role in mitigating the damage to its customers in similar, future attacks.
Led by Jonathan Sander, STEALTHbits’ Strategy and Research Officer and prominent data security industry expert, the webinar will be held on Thursday, January 8 at 11:30 am EST. As a live, interactive event, attendees will have the opportunity to learn more about the breach, how it relates to their organizations, and ask questions of a recognized industry expert.
“In a sense, the Sony breach is more frightening for enterprises than Home Depot or Target because there was no profit motive,” noted Sander. “Home Depot and Target can calculate the cost of stolen credit card numbers, but the reputation damage inflicted on Sony and its executives simply can’t be quantified. That’s one difference between structured and unstructured data breaches, and we’ll dive into that in some detail January 8.”
Sander will detail what we know about the mechanics of the breach, and how the attack’s effectiveness could have been blunted both before and after the hackers successfully breached Sony’s external defenses.
“After the external firewall is penetrated in a breach, most enterprises are defenseless, and at the mercy of the attackers, but they don’t have to be,” added Adam Laub, STEALTHbits’ Vice President. “STEALTHbits has products that can greatly reduce the exposure of sensitive material, and also reduce the organization’s time of awareness, significantly limiting the damage of an attack like the one Sony experienced. We look forward to discussing that in detail during the webinar.”
To register for the free Webinar, or to learn more about STEALTHbits and the Sony breach, visit www.stealthbits.com.
For more information on STEALTHbits’ Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance-suite
For information on integrating STEALTHbits’ solutions with IAM platforms, visit http://www.stealthbits.com/solutions/by-business-need/integrate-unstructured-data-with-iam
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today’s greatest threats.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.
# # #
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965