If you know StealthAUDIT, you know it’s one of the most versatile technologies around for addressing a broad range of data collection and analysis, reporting, and governance needs. StealthAUDIT appeals to the requirements of multiple audiences within an organization, simultaneously facilitating successful outcomes for security, compliance, and operationally focused teams. While its usefulness to so many is one of the things that makes StealthAUDIT so unique amidst a landscape of point products, we’d argue that its versatility is actually a necessity for any organization looking to truly tackle some of the most challenging problems they face today.
Here are some of the multi-faceted enhancements we’ve made for the multi-faceted StealthAUDIT user (both current and prospective) in this major 9.0 release:
StealthAUDIT 9.0 builds on nearly two decades of understanding that the usefulness of data is largely dependent upon the lens it is viewed through. Among the many improvements in this latest release, are new capabilities within StealthAUDIT’s Active Directory module. Via integration with StealthINTERCEPT, StealthDEFEND or STEALTHbits Active Directory Activity Monitor, StealthAUDIT for Active Directory has been enhanced to provide advanced historical analysis and reporting on the high-fidelity AD activity stream STEALTHbits’ products collect.
Why is this important?
Whether you’re looking to clean-up and consolidate AD, get to the cloud quickly and efficiently, secure your data, or demonstrate compliance with virtually any standard, none of it happens in a vacuum and certainly not overnight. However, even the simplest of questions can halt one of these projects dead in their tracks because ultimately, you need to do all of this without interruption to your business or putting it in harm’s way.
The ability to answer these questions with certainty could be the difference between catastrophic outage, compliance violation, security breach, or just another day at the office. The advanced, automated, historical analysis of Active Directory authentication, change, and LDAP request activity provides a whole new view on these familiar yet daunting questions that keep you up at night, allowing you to make decisions with confidence and a fraction of the effort.
Anyone dealing with modern compliance regulations like GDPR and CCPA knows that auditors are pretty undiscerning when it comes which platform or format your sensitive data is stored in. If it’s in your environment, if it’s under your responsibility, it’s in scope.
Demonstrating a continued commitment to providing the visibility you need into the places you need it most, we’ve introduced a new module for Oracle database auditing and compliance reporting in StealthAUDIT 9.0. StealthAUDIT for Oracle provides the ability to collect and report on permissions, activity events, sensitive data and configuration related information within Oracle database environments, adding onto the support we introduced for Microsoft SQL Server databases in StealthAUDIT 8.1.
With comprehensive visibility into the location, configuration, health, and security of your organization’s Oracle databases, you’ll be prepared for any audit that comes your way.
StealthAUDIT 9.0 also includes Microsoft Azure Information Protection (AIP) integration, capable of collecting AIP Protection labels and scanning for sensitive data within files protected by AIP. Additionally, a new REST API provides yet another way for third-party applications to integrate with StealthAUDIT, enabling queries of StealthAUDIT’s backend database.
These new capabilities are just a small sampling of enhancements we’ve made in StealthAUDIT 9.0, which also includes new features and capabilities aligning to our Azure AD, Box, Dropbox, Exchange, File Systems, SharePoint, and Windows modules.
Want to learn more about StealthAUDIT 9.0? Visit our What’s New page.
Want to see a demo? Fill out our demo request form.
Want to get StealthAUDIT installed in your environment? Contact us.
As General Manager, Adam is responsible for product lifecycle and market adoption from concept to implementation through to customer success. He is passionate about market strategies, and developing long-term path for success for our customers and partners.
Previously, Adam served as CMO and has held a variety of senior leadership positions at Stealthbits – now part of Netwrix including Sales, Marketing, Product Management, and Operational Management roles where his focus has consistently been setting product strategy, defining roadmap, driving strategic engagements and product evangelism.
Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply