Monday, 01 August 2016 13:11

STEALTHbits Places Controlling and Securing Credentials and Data in the Forefront With Latest StealthAUDIT Release Featured

Written by
Rate this item
(0 votes)

HAWTHORNE, NJ, August 1, 2016 – STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced the latest release of its flagship data access governance solution, StealthAUDIT®, placing a spotlight on controlling and securing credentials and data.

"This release is all about securing credentials and data; the two things every attacker is targeting, regardless of how they got it, or if they were on the inside to begin with," said Adam Laub, STEALTHbits' Senior Vice President of Product Marketing. "We're continuing to place a high priority on allowing our clients to lock down the information that matters most to them, and the accounts that provide access to that information."

StealthAUDIT is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting.

Version 7.2 enhances security in a variety of ways.

Said Laub, "We added a brand new solution set that automates the discovery of privileged accounts across Unix and Linux infrastructures, which when combined with the visibility StealthAUDIT already offers into local admin access across all Windows endpoints, acts as a one-stop-shop into understanding all administrative access to systems in the environment." Added Laub, "There's also now a new review workflow in the Access Information Center that performs reviews specifically on sensitive data with your data owners, allowing users to easily govern sensitive data and make proper decisions about how to lock it down."

In addition to adding brand new workflows to help identify and remediate stale data, six new threat models including Ransomware, Sensitive Data Activity, Stale File Activity, User Share Activity, Peer Group Activity, and Modified Binaries have been added to alert users about statistically significant deviations from normal user activity.

Upgrades for v7.2 of StealthAUDIT will be available starting August 15th. For the full list of features and enhancements in v7.2, we invite you to visit http://go.stealthbits.com/new-stealthaudit-release. To arrange a private demonstration, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it..

About STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit http://www.stealthbits.com, email This email address is being protected from spambots. You need JavaScript enabled to view it. , or call +1-201-447-9300.

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.


# # #

Media Contact:

Dan Chmielewski
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965
This email address is being protected from spambots. You need JavaScript enabled to view it.

Additional Info

  • Title Tag: STEALTHbits Places Securing Credentials and Data in the Forefront With StealthAUDIT
Read 1199 times Last modified on Wednesday, 08 November 2017 23:29

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.