Tuesday, 18 October 2016 13:33

Newest Release of Award-Winning Change and Access Monitoring Solution Makes Critical Advances In Protecting Active Directory, File Systems and Exchange Featured

Written by

HAWTHORNE, NJ, October 17, 2016 – Stealthbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced today the newest release of its award-winning StealthINTERCEPT real-time change and access monitoring solution.

“Every major data breach has two things in common – the theft of credentials and data. With this release of StealthINTERCEPT, we give organizations two new and very powerful weapons to protect both,” said Mark Wilson, Director of Product Management for Stealthbits Technologies. “When accounts are compromised by attackers, there are no native mechanisms to prevent the attacker from accessing any resources the account has legitimate access to, with the exception of disabling the account altogether. With StealthINTERCEPT’s visibility into every Kerberos and NTLM authentication, ability to control which resources particular accounts can authenticate from or to, and detect authentication activities indicative of compromised credentials, organizations can stop active attacks in their tracks by blocking Active Directory accounts from authenticating from or to these resources.”

Augmenting StealthINTERCEPT’s authentication blocking capabilities, this newest release also protects an organization’s unstructured data by providing automatic file system activity blocking for users exhibiting suspicious activity on Windows File Systems. “Once ransomware, external attackers, and internal bad actors have gained access to file systems, there is often little that can be done to stop an attack in progress. This often results in significant, costly data loss and destruction,” continued Wilson. “StealthINTERCEPT enables organizations to monitor the file activity events on their Windows file servers and shares without any reliance on native logging so they not only detect indicators of compromise in real-time, but automatically block the attack from proceeding any further. The result is immediate detection of destructive attacks with minimal damage or loss to the business.”

For Exchange, StealthINTERCEPT 4.0 adds operation-level monitoring for critical activities such as messages read, attachments accessed or forwarded, deletions, and other indicators of compromise or abuse, to its existing capabilities that monitor, control, and alert on Exchange mailbox access events and permission changes in real-time, without any reliance on native auditing.

Version 4.0 of StealthINTERCEPT is available immediately. To learn more, we invite you to register here for our webinar demonstrating the latest version of StealthINTERCEPT on Thursday, November 3. Or, to arrange a private demonstration, contact us at This email address is being protected from spambots. You need JavaScript enabled to view it..

About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit http://www.Stealthbits.com, email This email address is being protected from spambots. You need JavaScript enabled to view it. , or call +1-201-447-9300.

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

# # #

Media Contact:

Dan Chmielewski
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965
This email address is being protected from spambots. You need JavaScript enabled to view it.

Additional Info

  • Title Tag: Change & Access Monitoring Solution Protects File Systems
Read 4322 times Last modified on Monday, 13 April 2020 15:30

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.