Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits puts Sensitive Information into the Data Access Governance mix with StealthAUDIT 6.3

February 24, 2014

HAWTHORNE, NJ, FEBRUARY 24th, 2014 – Stealthbits Technologies Inc., leading supplier of unstructured data and Microsoft infrastructure solutions, announced today that it is releasing version 6.3 of the StealthAUDIT Management Platform at the RSA Security Conference. With this release Stealthbits changes the game on traditional governance for unstructured data by adding a focus on sensitive data and an expanded set of data activity tracking capabilities, including the ability to identify suspicious activity. The name of the game is context, and with integrated content awareness through their innovative StealthSEEK product line’s sensitive data discovery capabilities and complete knowledge of how data is being used through their Data Activity Tracking capabilities, Stealthbits has made Data Access Governance more complete and powerful than ever before.

The StealthAUDIT Management Platform delivers:

  • NEW – Sensitive data discovery scanning information integrated into the only true effective access solution on the market. This enables complete context based on the permissions, state, and content of the unstructured data you’re trying to secure.
  • NEW – Data activity tracking for all the critical infrastructure where your unstructured data resides. This allows an integrated approach to governance where decision makers know not only all the context about the data, but also how current rights on that data are being used.
  • NEW – Suspicious Activity Tracking to identify anomalous or suspicious activity events on file shares. With a sharp spike in insider data breach events occurring worldwide, this enables organizations to proactively identify users who are accessing data they never have before or at strange hours of the day.
  • NEW – UNIX File Share support for scanning permissions on NFS and SAMBA shares. This allows organizations to not only understand who has access to data sitting on Windows Servers and NAS devices, but to go cross-platform into UNIX and Linux systems for an even broader view into access to unstructured data.

The StealthAUDIT Management Platform is already the market visionary on unstructured data analysis and reporting. With the addition of context from sensitive information and activity tracking, the vision is complete.


EXECUTIVE QUOTE:

Steve Cochran, CEO, Stealthbits Technologies, Inc.

“Stealthbits has been leading in data access governance since we entered the space 5 years ago. Our latest version takes all the threads we offer and ties them up into one place where our customers can get a complete view of what their unstructured data is doing. This is what our customers have been asking for and now we are delivering.”


AVAILABILITY

StealthAUDIT Management Platform version 6.3 is now available worldwide.


ADDITIONAL RESOURCES

For a full list of all the enhancements available in v6.3, visit www.Stealthbits.com/products/stealthaudit-management-platform

For more information on Data Activity Tracking, visit www.Stealthbits.com/products/stealthaudit-management-platform/data-activity-tracking

© 2022 Stealthbits Technologies, Inc.