StealthAUDIT® Management Platform
Agent-less data collection. Powerful analysis tools. Bulk remediation.
The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small footprint, and powerful collection capabilities ensure that our products are flexible enough to provide value in any IT environment.
Here's How It Works
The STEALTHbits Advantage
It all starts with Active Directory. We collect all of the objects, settings, configurations and permissions from AD and correlate them with metadata, activity information and permissions from the systems that AD controls access to.
The vast majority of StealthAUDIT data comes from agentless scans and log collection. This enables the remote collection of thousands of data points across dozens of system and application types and reduces our footprint in your environment.
Our low-profile architecture combined with our powerful scans allows us to scale to the largest environments in the world and run at top speed while we do it.
The data collected by StealthAUDIT is stored in a SQL database, allowing for maximum flexibility in analysis. Analysis modules allow users not versed in SQL to interact with the data as if they were SQL pros.
StealthAUDIT offers users multiple options for one-off and bulk remediation of issues discovered within the environment. Intuitive interfaces guide users to model changes and execute them with ease.