StealthAUDIT® Management Platform

Agent-less data collection. Powerful analysis tools. Bulk remediation.

The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small footprint, and powerful collection capabilities ensure that our products are flexible enough to provide value in any IT environment.

 

The StealthAUDIT Management Platform

The StealthAUDIT Management Platform is the framework behind the products that give you unprecedented control over your Microsoft-connected infrastructure.

StealthAUDIT® for Active Directory
StealthAUDIT® for Data Access Governance
StealthAUDIT® for Exchange
StealthAUDIT® for Systems Governance

Here's How It Works

StealthAUDIT® Management Platform Diagram

The STEALTHbits Advantage

It all starts with Active Directory. We collect all of the objects, settings, configurations and permissions from AD and correlate them with metadata, activity information and permissions from the systems that AD controls access to.

The vast majority of StealthAUDIT data comes from agentless scans and log collection. This enables the remote collection of thousands of data points across dozens of system and application types and reduces our footprint in your environment.

Our low-profile architecture combined with our powerful scans allows us to scale to the largest environments in the world and run at top speed while we do it.

The data collected by StealthAUDIT is stored in a SQL database, allowing for maximum flexibility in analysis. Analysis modules allow users not versed in SQL to interact with the data as if they were SQL pros.

StealthAUDIT offers users multiple options for one-off and bulk remediation of issues discovered within the environment. Intuitive interfaces guide users to model changes and execute them with ease.

Resources

Data Access Governance Buyer's Guide Thumbnail

Data Access Governance
Buyer's Guide

Governing Access to Unstructured Data Video Thumbnail

Video - Getting Unstructured Data Under Control for Security & Compliance

Building a Successful DAG Program Thumbnail

White Paper - Building a Successful Data Access Governance Program