HAWTHORNE, NJ--(December 12, 2017) - STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced the enhancements of its flagship product StealthAUDIT. With version 8.1, STEALTHbits becomes the first Data Access Governance solution provider to support both unstructured and structured data repositories.
A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/c1ce5c75-3b92-4365-8d0f-081489a0570c
Data privacy and security is quickly evolving to be on equal footing with traditional security measures focused on the network, hardware, or software the data is contained within. Organizations aligning to concepts like Data-Centric Audit and Protection (DCAP) defined by Gartner, or the requirements of strict compliance regulations like EU GDPR, are looking to implement processes that help them understand where sensitive data is stored, who has access to the data, and what are users doing with their access privileges across unstructured and structured data sources.
“As part of STEALTHbits’ comprehensive Data Access Governance suite for structured and unstructured data, StealthAUDIT automates the process of understanding where SQL databases exist, who has access to them, how they obtained access, who or what is leveraging their access privileges, where sensitive information resides, and how each database has been configured,” said Adam Laub, STEALTHbits SVP of Product Marketing.
With visibility into every corner of Microsoft SQL Server and the Windows Operating System it relies upon, organizations can proactively highlight and prioritize risks to sensitive data. Additionally, organizations can automate manual, time-consuming, and expensive processes associated with compliance, security, and operations to easily adhere to best practices that keep SQL Server safe and operational.
In addition to platform support for Microsoft SQL Server, StealthAUDIT’s Active Directory module now includes the ability to identify weak passwords by automatically comparing the password hashes of users against password hashes found in attacker dictionaries or organizationally-defined unapproved password lists to help locate and eliminate weak passwords. Version 8.1 also expands upon the automated threat reporting for Active Directory and Windows introduced in v8.0, broadening visibility into conditions, misconfigurations, and weaknesses attackers exploit in the real-world to compromise systems and escalate privileges.
StealthAUDIT v8.1 also contains many other updates, including; RBAC controls for StealthAUDIT Published Reports, sensitive data discovery support for Exchange, upgrade improvements, SharePoint 2016 support, and more.
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.
# # #
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965