STEALTHbits Announces StealthAUDIT v6.2.187

Share Article

At a time when the stakes are rising for IT’s failure to comply with major regulations like SOX, PCI, HIPAA, GLBA, NERC/FERC etc., or defend against beaches like the NSA Data leaks, companies need better Governance over their Unstructured Data.

News Image

STEALTHbits Technologies, a leading developer of Data and Access Governance solutions announces the latest release of its flagship platform, StealthAUDIT v6.2.187

At a time when the stakes are rising for IT’s failure to comply with major regulations like SOX, PCI, HIPAA, GLBA, NERC/FERC etc., or defend against breaches like the NSA Data leaks, companies need better Governance over their Unstructured Data.

StealthAUDIT’s market leading Data & Access Governance Suite now expands its reach into unstructured data managed by storage virtualization solutions like Microsoft’s Distributed File System. “As organizations increasingly turn to storage virtualization, they are encountering challenges with accurate reporting on data access.” said Sean Cataldo, VP of Product Management for STEALTHbits Technologies. “With StealthAUDIT’s support for Microsoft’s DFS, we’re helping to ensure that no matter where the data resides, our clients can measure, monitor, and mitigate their risk.” Moreover, StealthAUDIT’s activity monitoring now captures and reports on file level activity.

This latest release also offers enhanced Active Directory reporting. Jeff Warren, VP of Technical Product Management for STEALTHbits adds “By measuring a variety of Active Directory variables and tracking changes, StealthAUDIT is able to establish meaningful context about the impact those access changes have on an organization’s risk posture.” Also, new reports provide visibility into the toxicity of AD groups and how often they are applied to resources, providing valuable insight into how to best clean-up or consolidate Active Directory.

StealthAUDIT’s Access Information Center has undergone several enhancements. Most notably, the AIC now offers data custodians better control over the entitlement review process by enabling the ability to execute access revocations.

Finally, StealthAUDIT’s platform supportability continues to grow, and with this release, we announce inclusion of Exchange 2013.

For more information, visit http://www.stealthbits.com/ or email sales(at)stealthbits(dot)com or call +1-201-447-9300.

About STEALTHbits
STEALTHbits Technologies, Inc. enables Control through Visibility offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at http://www.stealthbits.com and follow STEALTHbits on Twitter.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Adam Laub
Follow us on
Visit website