Let’s face it – security professionals struggle to keep up with and defend their organizations against the wide variety of tactics, techniques, and procedures (TTPs) attackers can use to infiltrate networks, elude detection, compromise credentials, and escalate privileges on their way to compromising enterprise data. Correspondingly, there is an ever-increasing number of storage platforms and repositories available to house the data security professionals need to protect, both on-premises and in the cloud.
Only amplified by recent worldwide events, we feel it’s not just important, but essential for technology providers like us to do the heavy lifting for security professionals like you that have too much on their plates to begin with and little time to spare. In StealthAUDIT 10.0, we put the focus on providing users the visibility needed into the threats they didn’t know existed and the repositories they had limited visibility into before.
This latest release of StealthAUDIT is our most impressive yet, and we’re excited for you to get your hands (and eyes, as you’ll see) on it!:
At the top of the list for StealthAUDIT 10.0’s enhancements is the addition of Shadow Access Rights analysis, enabling security staff to proactively and explicitly identify attack paths bad actors can take to move laterally, escalate privileges, compromise entire domains, and gain access to sensitive data. Knowing is half the battle.
The fact of the matter is, while some risks are simple to identify, others lurk beneath the surface and exist due to the right – albeit toxic – combination of permissions and conditions. The correlation of highly detailed and comprehensive views into object-level permissions, as well as environmental conditions such as the location of sensitive information and open administrative sessions across desktop and server infrastructure, allow for visualization of real and viable attack paths. Understanding how bad actors look to exploit these potential attack paths, helps simplify the remediation of these otherwise hidden risks.
We have expanded support for two of the cloud’s most widely-used object storage and database platforms with solutions for Amazon Simple Storage Service (S3) and Azure SQL. The goal is to protect data wherever it resides, structured or unstructured; cloud or on-premises. Amazon S3 and Azure SQL are among the most popular destinations for organizations to store data in the cloud, serving the needs of thousands of enterprises globally. With the launch of StealthAUDIT 10.0, Stealthbits now provides even more comprehensive platform support, serving up an aggregated, normalized, single pane of glass view of user access, activity, and sensitive data across an organization’s entire data landscape.
Databases serve critical functions within businesses of all sizes, as well as house some of the most sensitive information within an enterprise. Much like the applications most databases support, databases are vulnerable to compromise via multiple vectors, including the application layer, the operating system layer, and the database technology itself. Understanding and proactively identifying risks at each of these layers is imperative to protecting the sensitive data bad actors seek to locate and exfiltrate from an organization. New structured data security assessment reports within StealthAUDIT 10.0 highlight the scope of the audited environment and categorize High, Medium, and Low Severity findings in an easy to use and view report. Security professionals can quickly prioritize vulnerabilities to be remediated, saving time and ensuring holistic database security regardless of location.
One of the more noticeable enhancements in StealthAUDIT 10.0 is an overhaul of the product’s web reporting, governance, and console interfaces in an effort to provide greater ease-of-use and a more modern aesthetic. While these interfaces look fresh and new, they will still be instantly familiar to users, eliminating any learning curve that can accompany these kinds of enhancements. This redesign also brings the added benefit of a consistent look and feel across all web-based interfaces within Stealthbits’ portfolio, which multi-product users will enjoy and appreciate as they navigate across products.
In addition to the key enhancements described above, StealthAUDIT 10.0 also delivers the following:
Do more with StealthAUDIT 10.0!
These new capabilities are just a small sample of the value Stealthbits can bring to your organization!
Want to learn more? Visit our StealthAUDIT webpage.
Want to see a demo? Fill out our demo request form. Want to get StealthAUDIT installed in your environment or do an evaluation in Stealthbits’ CloudLab? Contact us.
Adopting a Data Access Governance strategy will help any organization achieve stronger security and control over their unstructured data. Use this free guide to help choose the best available solution available today!Read more
Start a Free Stealthbits Trial!
No risk. No obligation.
Leave a Reply