Announces Latest Release of Flagship Product -- StealthAUDIT 8.0
HAWTHORNE, NJ--(May 3, 2017) - STEALTHbits Technologies Inc., a leading cybersecurity software company focused on protecting an organization's credentials and data, announced today powerful new functionality that enables organizations to overcome the largest hurdle in securing their unstructured data.
"Starting with a clean and consistent permissions model is critical to the success of any governance initiative," said Adam Rosen, VP of Data Access Governance at STEALTHbits Technologies. "StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware."
StealthAUDIT 8.0 has also made significant strides in Active Directory (AD) object permissions analysis to give unprecedented visibility into privileged access within AD, Optical Character Recognition (OCR) support for sensitive data discovery within images and PDFs, expanded cloud platform support with the addition of Box, and exciting technology integrations with both CyberArk Application Identity Manager™ and Boldon James Classifier.
About STEALTHbits Technologies
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization's credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
Identify threats. Secure data. Reduce risk.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.
# # #
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965