StealthAUDIT® Management Platform

Scaling up, automating, and seamlessly integrating to maximize security & governance investments.

The platform is the power behind the StealthAUDIT products. It has the automation, management, and integration building blocks that ensure the solutions’ advanced data collection and analysis deliver meaningful results to your team, your infrastructure, and your other technologies.

Watch Video

 

Request a Free Trial

Powered by ChronoForms - ChronoEngine.com

The Power's in the Platform

Manage and Control Access to Unstructured and Structured Data, Systems, and Critical Applications

Microsoft Windows file server auditing and management.

StealthAUDIT for File Systems

StealthAUDIT for File Systems is an auditing, compliance, and governance solution for Windows, NAS, and *nix File Systems. Key capabilities include effective access calculation, data owner identification, governance workflows including entitlement reviews and self-service access requests, sensitive data discovery and classification, open access remediation, least-privilege access transformation, and file activity monitoring.

SharePoint auditing and management.

StealthAUDIT for SharePoint

StealthAUDIT for SharePoint is an auditing, compliance, and governance solution for on-premises SharePoint installations, as well as Office 365 SharePoint Online and OneDrive for Business. Key capabilities include effective access calculation, data and site owner identification, governance workflows including entitlement reviews and self-service access requests, sensitive data discovery and classification, open access remediation, least-privilege access transformation, and file activity monitoring.

Microsoft SQL Server

StealthAUDIT for SQL

StealthAUDIT for SQL is an auditing, compliance, and governance solution for Microsoft SQL databases. Key capabilities include effective access calculation, sensitive data discovery, security configuration assessment, and database activity monitoring.

Dropbox secure file sharing and storage.

StealthAUDIT for Dropbox

StealthAUDIT for Dropbox is an auditing, compliance, and governance solution for Dropbox for Business. Key capabilities include effective access calculation, Dropbox file content inspection, inactive access and stale data identification, and entitlement collection and publishing for inclusion in Identity & Access Management (IAM) programs.

box secure file sharing and storage.

StealthAUDIT for Box

StealthAUDIT for Box is an auditing, compliance, and governance solution for Box Enterprise. Key capabilities include effective access calculation, Box file content inspection, inactive access and stale data identification, and entitlement collection and publishing for inclusion in Identity & Access Management (IAM) programs.

Microsoft Exchange server auditing and management.

StealthAUDIT for Exchange

StealthAUDIT for Exchange is an auditing, compliance, and governance solution for on-premises Exchange installations, as well as Office 365 Exchange Online. Key capabilities include Mailbox and Public Folder effective access calculation, sensitive data discovery, Public Folder and Distribution List clean-up, and mail-flow and remote connection auditing.

Azure active directory auditing and Management.

StealthAUDIT for Active Directory

StealthAUDIT for Active Directory is an auditing, compliance, and governance solution for Active Directory and Azure Active Directory. It provides IT with unprecedented knowledge about the relationships between objects in the environment, deep inspection of object-level permissions, comprehensive auditing of AD security and configuration settings, and remediation actions and workflows.

File system auditing software.

StealthAUDIT for Unix

StealthAUDIT for Unix is an auditing and reporting platform for Unix and Linux systems. Key capabilities include privileged account discovery, security configuration assessment, and user and group inventory and analysis.

Microsoft Windows file server auditing and management.

StealthAUDIT for Windows

StealthAUDIT for Windows is an auditing, compliance, and governance solution for Windows (desktops and servers). Key capabilities include privileged account discovery, security configuration and vulnerability assessment, patch validation, compliance reporting, and asset inventory.

StealthAUDIT Action Module Framework Icon

StealthAUDIT Action Module Framework

StealthAUDIT “Action Modules” enable users to remediate various conditions identified via StealthAUDIT data collection and analysis routines in bulk, as well as orchestrate workflows to automate otherwise manual processes and procedures corresponding to Active Directory, File Systems, SharePoint, Microsoft Exchange Server, and more.

StealthAUDIT Action Module Framework Icon

StealthAUDIT Active Directory Permissions Analyzer

The StealthAUDIT Active Directory Permissions Analyzer enables organizations to easily and automatically determine effective permissions applied to any and all Active Directory objects.

What Our Customers Are Saying

Microsoft Ignite - Scott Eftink

Video

Learn More

Microsoft Ignite - Tony Frasco

Video

Learn More

 
 

Features and Benefits

Data security for unstructured data
  • Lightweight yet Scalable – Forged in the fires of the most demanding IT infrastructures in the world, StealthAUDIT is both lightweight enough to run everywhere it’s needed yet scalable enough to handle the load that spreading out far and wide brings.

  • Seamless Integration – StealthAUDIT can push and pull data to and from dozens of technologies, including home-grown systems, to enhance the value of your other technology investments. Integrations with IAM, IAG, PIM, PAM, SIEM, CMDB, and other enterprise platforms are examples of how this integration is leveraged by our customers.

  • Process Automation – StealthAUDIT seamlessly ties together disparate processes, creating fully automated solutions that save time, avoid unnecessary costs, and alleviate burden on IT.

  • End-User Workflows – Not all the data you need comes from a system or application. When input and answers are required from actual human beings, StealthAUDIT provides simple, yet effective survey capabilities to retrieve and incorporate end-user feedback into the data analysis and decision-making process.

  • Data Analysis – StealthAUDIT Analysis Modules allow you to slice-and-dice your data in every way possible, including correlation with existing and alternative data sources, easy-to-use view creation, historical trending, injection of business rules and logic, notification, exportation, and more. Users and consultants can also extend analysis with powerful SQL, PowerShell, and VB script inputs and exits.

  • Powerful Reporting – Regardless of source, StealthAUDIT can report on any available dataset. Already have a reporting platform? StealthAUDIT can supply the comprehensive, fully integrated and analyzed data that your favorite reporting platform has been waiting for. Either way, your reports transform into the authoritative data you need to power insight and decisions.

What's New: StealthAUDIT 8.2 is Here!

STEALTHbits becomes the first Data Access Governance solution provider to support both unstructured and structured data repositories.

Resources

StealthAUDIT Management Platform

Data Sheet

Learn More

Data Access Governance

Buyer's Guide

Learn More

Active Directory Optimization

Buyer's Guide

Learn More

StealthAUDIT Action Module Framework

Solution Brief

Learn More