Thursday, 17 October 2013 12:12

StealthSEEK v2.0 Released - Action Facilities to Control and Secure Sensitive Data Leads List of Enhancements

Written by
Rate this item
(0 votes)

HAWTHORNE, NJ, OCTOBER 17th, 2013 - , STEALTHbits Technologies a leading developer of Data and Access Governance solutions has released a new version of StealthSEEK, a light-weight yet powerful sensitive data discovery solution. This latest version comes with enhancements to help organizations take actions on the sensitive data they find. Threat to personal data and intellectual property has risen exponentially over the past decade with a boom in unstructured data. Cases like the recent intentional and unauthorized disclosure of U.S. national defense information (NSA), theft of private information about millions of customers from an organization’s system (Adobe), and so many others have opened up questions about how “secure” secured data actually is. The answers to these questions are manifold and STEALTHbits’ latest release of StealthSEEK will help straighten and streamline any organization’s security posture.

StealthSEEK v2.0 is designed to give users the capability to take actions on the sensitive content found within their environment to secure it in the best possible way. With these data actions – the ability to copy, move, delete, rollback, and flag false positives – StealthSEEK now equips users with a complete workflow of not simply discovering sensitive data, but also securing it.

“With these new features, StealthSEEK not only provides users the ability to see where high-risk and sensitive content exists and who has access to it, but it allows them to immediately take informed actions to secure it.” says Kevin Foisy, Chief Software Architect at STEALTHbits Technologies. “As opposed to traditional DLP frameworks providing data-at-rest scanning, StealthSEEK can be installed and begin providing value within hours. The addition of data actions means that organizations now have a complete workflow for identifying and securing sensitive data today, not next week or next month. This is particularly important because of the rate at which data changes within an organization’s desktop, server, and network file share environments. StealthSEEK is the “get it done today” tool for securing all kinds of sensitive data.”

“With StealthSEEK, we now get the answers to our specific scans in minutes. Prior to using StealthSEEK, our scans were taking us too long; sometimes even more than one week, and the process was just too complicated. StealthSEEK is easy to download and deploy, and we determine what we want to scan”, says a Senior IT Security Risk and Compliance Analyst at a prestigious university in the Northeast.

Each new feature only adds to the value of this solution but remains cost-effective, flexible, accurate, and fast! The simple 3-step workflow of Risk Profiling, Sensitive Data Discovery, and Remediation provides a powerful process to manage the most complex data privacy problems plaguing organizations today and a greater understanding of the security and compliance stature of the environment.

StealthSEEK v2.0 Enhancements:

  • Data Actions - Ability to copy, move, delete, and rollback
    • Each data action produces a stub file to inform users of the action performed.
    • “Undo move” reverts the file to its original location with permissions intact
  • Flag False Positives
    • Ability to flag files with false positives or false hits so they are not identified
      during a re-scan
  • Ability to view share and folder level permissions
  • New and Enhanced Criteria Set
    • System criteria includes new conditions to scan for
    • Greater accuracy to reduce false positive
  • Enhanced Reporting Capability
    • Ability to produce reports on hosts profiled, results obtained, and data actions performed
  • Enhanced reliability and scalabilityto better protect scans against corrupted files and
    other exceptions
  • Improvement in the overall usability, layout and design of the StealthSEEK console

For more information, visit or email This email address is being protected from spambots. You need JavaScript enabled to view it. or call +1-201-447-9300.

About STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits Technologies, Inc. enables ‘Control Through Visibility’ offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at and follow STEALTHbits on Twitter.

# # #

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

Additional Info

  • Title Tag: StealthSEEK v2.0 Released - Control & Secure Sensitive Data | STEALTHbits
Read 3444 times Last modified on Thursday, 09 November 2017 15:32

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.