Hawthorne, NJ (PRWEB) September 30, 2013
STEALTHbits Technologies, a leader in Data & Access Governance solutions, announced today that they will be exhibiting at EDUCAUSE’s annual conference, opening October 15 in Anaheim, CA.
STEALTHbits will be showcasing their Sensitive Data Discovery Solution, StealthSEEK, which provides colleges and universities the ability to identify and protect sensitive data such as credit card numbers, social security numbers, health records, and other Personally Identifiable Information (PII).
StealthSEEK has found a home in the Education industry due to its scalability, surgical accuracy, speed-of-results, and cost-effective licensing structure. This month alone, StealthSEEK has been adopted by five domestic and international institutions that were looking for a proactive approach for preventing data breach events.
“With StealthSEEK, we now get the answers to our specific scans in minutes. Prior to using StealthSEEK, our scans were taking us too long; sometimes even more than one week, and the process was just too complicated. StealthSEEK is easy to download and deploy, and we determine what we want to scan”, says a Senior IT Security Risk and Compliance Analyst at a prestigious university in the Northeast.
“The rise of data breach incidents and the continued strict enforcement of PII privacy, through compliance regulations such as HIPAA, PCI DSS, FERPA, and more, have led to the need of Sensitive Data Discovery Tools like StealthSEEK”, says Mamata Krishnamurthy, the Product Manager of StealthSEEK.
Conference attendees who would like to see a demonstration of StealthSEEK or any of STEALTHbits’ solutions are invited to visit booth #664 on the EDUCAUSE exhibit floor.
About STEALTHbits Technologies
STEALTHbits Technologies enables IT Control Through Visibility offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.