Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

Stealthbits

Posts by Adam Rosen

Home >Adam Rosen
Adam Rosen serves as Vice President of Data Access Governance at Stealthbits - now part of Netwrix. An expert on managing and securing unstructured data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity at Stealthbits, he manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information.

Introducing the Data Privacy Engine

Today, we are introducing a new method to tackle Data Subject Access Requests (DSARs) that will enable our customers to obtain results in seconds. Available as an add-on to complement StealthAUDIT, Data Privacy Engine effectively connects identities with the location of their personal information. Thanks to the pre-discovery of attributes of data subjects across all […]

Global Compliance Demands: The Singaporean Personal Data Protection Act (PDPA) Reviewed

| Adam Rosen | Compliance | Leave a Comment

The push for data privacy regulation has exploded in recent years, with the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) taking center stage. Gartner predicts  “ By 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations, up from 10% today.” For much of the world, this […]

Data Privacy Essentials: #1 – Don’t Put Your Data at Risk. #2 – Don’t Forget #1

| Adam Rosen | Security | Leave a Comment

In my last blog, I stated that “data security can be achieved without data privacy, but you can’t effectively fulfill data privacy without data security. When it comes to complying with regulations, or protecting against breaches, if you don’t know your data, you won’t be able to justify it to a regulator, or safeguard it […]

Data Privacy and Security are Two Sides of the Same Coin

| Adam Rosen | Security | Leave a Comment

Two things can be inherently related, even though they are thought of differently. Examples abound, from tragedy and comedy, to fear and elation. Many pairs just go hand in hand; like privacy and security.   Flipping a coin to resolve a decision will cause one person to win, and the other to lose. The same […]

ProTip: Eliminating Weak Active Directory Passwords

Here’s a quick way to identify accounts with bad passwords in your Active Directory (AD). If you’re running StealthAUDIT for Active Directory, this is a very effective yet low-effort way to eliminate compromised passwords from your domain. Finding the bad passwords: From your web browser, click through the report tree down to the Active Directory>Users […]

StealthAUDIT 8.0 is Here!

This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier! StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based […]

5 Challenges with Combining Data Access Governance and Identity Access Management

| Adam Rosen | Uncategorized | Leave a Comment

In a recent webinar, I discussed the five challenges that are faced when combining Data Access Governance and Identity and Access Management. The Identity Access Management Blindspot Unstructured data represents a significant risk for every organization. The files spread across file systems, SharePoint sites, and cloud applications continue to grow at a rapid pace, making […]

Optimizing Your Data Governance Strategy for EU GDPR

| Adam Rosen | Uncategorized | Leave a Comment

With European Union General Data Protection Regulation (EU GDPR) set to take effect on May 25, 2018, the proper handling of personal data is more critical than ever. Last April, my colleague, Mark Wilson, explained exactly how the new regulations will impact US and multi-national companies that process personal data of EU citizens. Among the highlights […]

Market Trends: Data Access Governance

Excessive access to unstructured data is pervasive in enterprise file environments around the world. In a recent report, 62% of the business users surveyed reported having access to content they should not be able to view. In light of recent breaches, malware attacks, and insider theft, many organizations now recognize that Access Governance is critical […]

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL