STEALTHbits Technologies Releases StealthSEEK v2.0 – Action Facilities to Control and Secure Sensitive Data Leads List of Enhancements
Hawthorne, NJ (PRWEB) October 17, 2013 -- STEALTHbits Technologies, a leading developer of Data & Access Governance software solutions has released a new version of StealthSEEK, a light-weight yet powerful sensitive data discovery solution. This latest version comes with enhancements to help organizations take actions on the sensitive data they find. Threat to personal data and intellectual property has risen exponentially over the past decade with a boom in unstructured data. Cases like the recent intentional and unauthorized disclosure of U.S. national defense information (NSA), theft of private information about millions of customers from an organization’s system (Adobe), and so many others have opened up questions about how "secure" secured data actually is. The answers to these questions are manifold and STEALTHbits’ latest release of StealthSEEK will help straighten and streamline any organization’s security posture.
StealthSEEK v2.0 is designed to give users the capability to take actions on the sensitive content found within their environment to secure it in the best possible way. With these data actions – the ability to copy, move, delete, rollback, and flag false positives – StealthSEEK now equips users with a complete workflow of not simply discovering sensitive data, but also securing it.
"With these new features, StealthSEEK not only provides users the ability to see where high-risk and sensitive content exists and who has access to it, but it allows them to immediately take informed actions to secure it," says Kevin Foisy, Chief Software Architect at STEALTHbits Technologies. "As opposed to traditional DLP frameworks providing data-at-rest scanning, StealthSEEK can be installed and begin providing value within hours. The addition of data actions means that organizations now have a complete workflow for identifying and securing sensitive data today, not next week or next month. This is particularly important because of the rate at which data changes within an organization’s desktop, server, and network file share environments. StealthSEEK is the "get it done today" tool for securing all kinds of sensitive data."
Each new feature only adds to the value of this solution but remains cost-effective, flexible, accurate, and fast! The simple 3-step workflow of Risk Profiling, Sensitive Data Discovery, and Remediation provides a powerful process to manage the most complex data privacy problems plaguing organizations today and a greater understanding of the security and compliance stature of the environment.
StealthSEEK v2.0 Enhancements:
Data Actions - Ability to copy, move, delete, and rollback
- Each data action produces a stub file to inform users of the action performed.
- "Undo move" reverts the file to its original location with permissions intact.
Flag False Positives
- Ability to flag files with false positives or false hits so they are not identified during a re-scan.
Ability to view share and folder level permissions
New and Enhanced Criteria Set
- System criteria includes new conditions to scan for.
- Greater accuracy to reduce false positives.
Enhanced Reporting Capability
- Ability to produce reports on hosts profiled, results obtained, and data actions performed.
Enhanced reliability and scalability to better protect scans against corrupted files and other exceptions.
Improvement in the overall usability, layout and design of the StealthSEEK console.
For more information visit http://www.stealthbits.com/products/StealthSEEK.
About STEALTHbits Technologies
STEALTHbits Technologies, Inc. enables ‘Control Through Visibility’ offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built in-house from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at http://www.stealthbits.com and follow STEALTHbits on Twitter.
Adam Laub, STEALTHbitsTechnologies, Inc., http://stealthbits.com, +1 (201) 447-9300, [email protected]
Share this article