Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits Announces StealthAUDIT v6.2.187

August 2, 2013

Distributed File Systems, Change Tracking, File Activity & Entitlement Workflows

August 5, 2013, Hawthorne, NJ – Stealthbits Technologies, a leading developer of Data and Access Governance solutions announces the latest release of its flagship platform, StealthAUDIT v6.2.187

At a time when the stakes are rising for IT’s failure to comply with major regulations like SOX, PCI, HIPAA, GLBA, NERC/FERC etc… or defend against breaches like the NSA Data leaks, companies need better Governance over their Unstructured Data.

StealthAUDIT’s market leading Data & Access Governance Suite now expands its reach into unstructured data managed by storage virtualization solutions like Microsoft’s Distributed File System. “As organizations increasingly turn to storage virtualization, they are encountering challenges with accurate reporting on data access.” said Sean Cataldo, VP of Product Management for Stealthbits Technologies.  “With StealthAUDIT’s support for Microsoft’s DFS, we’re helping to ensure that no matter where the data resides, our clients can measure, monitor, and mitigate their risk”. Moreover, StealthAUDIT’s activity monitoring now captures and reports on file level activity.

This latest release also offers enhanced Active Directory reporting. Jeff Warren, VP of Technical Product Management for Stealthbits adds “By measuring a variety of Active Directory variables and tracking changes, StealthAUDIT is able to establish meaningful context about the impact those access changes have on an organization’s risk posture”. Also, new reports provide visibility into the toxicity of AD groups and how often they are applied to resources, providing valuable insight into how to best clean-up or consolidate Active Directory.

StealthAUDIT’s Access Information Center has undergone several enhancements. Most notably the AIC now offers data custodians better control over the entitlement review process by enabling the ability to execute access revocations.

Finally, StealthAUDIT’s platform supportability continues to grow and with this release we announce inclusion of Exchange 2013.

For more information, visit http://www.Stealthbits.com/ or email sales@Stealthbits.com or call +1-201-447-9300.


About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies, Inc. enables ‘Control Through Visibility’ offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, Stealthbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at www.Stealthbits.com and follow Stealthbits on Twitter.

# # #

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

© 2022 Stealthbits Technologies, Inc.