Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE
Stealthbits

Announcing StealthAUDIT 9.0

Blog >Announcing StealthAUDIT 9.0

StealthAUDIT 9.0 – Something for Everyone 

If you know StealthAUDIT, you know it’s one of the most versatile technologies around for addressing a broad range of data collection and analysis, reporting, and governance needs. StealthAUDIT appeals to the requirements of multiple audiences within an organization, simultaneously facilitating successful outcomes for security, compliance, and operationally focused teams. While its usefulness to so many is one of the things that makes StealthAUDIT so unique amidst a landscape of point products, we’d argue that its versatility is actually a necessity for any organization looking to truly tackle some of the most challenging problems they face today. 

Here are some of the multi-faceted enhancements we’ve made for the multi-faceted StealthAUDIT user (both current and prospective) in this major 9.0 release: 

Cloud Migration & AD Consolidation 

StealthAUDIT 9.0 builds on nearly two decades of understanding that the usefulness of data is largely dependent upon the lens it is viewed through. Among the many improvements in this latest release, are new capabilities within StealthAUDIT’s Active Directory module. Via integration with StealthINTERCEPT, StealthDEFEND or STEALTHbits Active Directory Activity Monitor, StealthAUDIT for Active Directory has been enhanced to provide advanced historical analysis and reporting on the high-fidelity AD activity stream STEALTHbits’ products collect. 

Why is this important? 

Whether you’re looking to clean-up and consolidate AD, get to the cloud quickly and efficiently, secure your data, or demonstrate compliance with virtually any standard, none of it happens in a vacuum and certainly not overnight. However, even the simplest of questions can halt one of these projects dead in their tracks because ultimately, you need to do all of this without interruption to your business or putting it in harm’s way. 

  • Where are groups being used? 
  • Who and what interfaces with each system? 
  • Where have applications been hardcoded to specific Domain Controllers? 
  • What are the most costly queries being run against AD? 
  • Which changes are affecting sensitive data access or elevating privileged access rights in unapparent ways (aka Shadow Access)? 

The ability to answer these questions with certainty could be the difference between catastrophic outage, compliance violation, security breach, or just another day at the office. The advanced, automated, historical analysis of Active Directory authentication, change, and LDAP request activity provides a whole new view on these familiar yet daunting questions that keep you up at night, allowing you to make decisions with confidence and a fraction of the effort. 

Expanded Platform Support and Interoperability 

Anyone dealing with modern compliance regulations like GDPR and CCPA knows that auditors are pretty undiscerning when it comes which platform or format your sensitive data is stored in. If it’s in your environment, if it’s under your responsibility, it’s in scope.  

Demonstrating a continued commitment to providing the visibility you need into the places you need it most, we’ve introduced a new module for Oracle database auditing and compliance reporting in StealthAUDIT 9.0. StealthAUDIT for Oracle provides the ability to collect and report on permissions, activity events, sensitive data and configuration related information within Oracle database environments, adding onto the support we introduced for Microsoft SQL Server databases in StealthAUDIT 8.1. 

Audit Oracle Sensitive Data Location, Access & Activity
StealthAUDIT for Oracle Enterprise Summary Report

With comprehensive visibility into the location, configuration, health, and security of your organization’s Oracle databases, you’ll be prepared for any audit that comes your way. 

StealthAUDIT 9.0 also includes Microsoft Azure Information Protection (AIP) integration, capable of collecting AIP Protection labels and scanning for sensitive data within files protected by AIP. Additionally, a new REST API provides yet another way for third-party applications to integrate with StealthAUDIT, enabling queries of StealthAUDIT’s backend database. 

There’s More in StealthAUDIT 9.0! 

These new capabilities are just a small sampling of enhancements we’ve made in StealthAUDIT 9.0, which also includes new features and capabilities aligning to our Azure AD, Box, Dropbox, Exchange, File Systems, SharePoint, and Windows modules. 

Want to learn more about StealthAUDIT 9.0? Visit our What’s New page

Want to see a demo? Fill out our demo request form

Want to get StealthAUDIT installed in your environment? Contact us

Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL