Netwrix and Stealthbits merge to better secure sensitive data. LEARN MORE

Stealthbits

Posts by Tuula Fai

Home >Tuula Fai
Tuula Fai is the Senior Marketing Director of StealthAUDIT at STEALTHbits. For the past 20 years, she has worked in a variety of roles within the software industry, starting as a developer and implementation engineer before moving into product marketing and digital campaigns. Having worked in both customer service and human resources, she is passionate about safeguarding customer and employee data as part of overall security initiatives. She graduated Summa cum Laude from Georgetown with an MBA in marketing and IT, and has won two technology marketing awards. You can find her running and writing in the Rocky Mountains of Colorado.

3 Key Takeaways from NetApp Insight 2017

| Tuula Fai | Uncategorized | Leave a Comment

NetApp Insight, NetApp’s annual technical conference, brought together storage and data management professionals to discuss changing the world with data. In over 200 technical sessions and the Insight Central exhibit hall, organizations learned how NetApp’s Data Fabric can help them: Harness the power of the hybrid cloud Build a next-generation data center Modernize storage through […]

Learn How to Defeat Advanced Attacks against Active Directory at Microsoft Ignite 2017

| Tuula Fai | Uncategorized | Leave a Comment

There’s a lot of news coverage on threats like ransomware, malware, and phishing that are all about punching holes in organizations to grab quick spoils. But what isn’t getting a lot of coverage is the careful, patient planning attackers do once inside your Microsoft Active Directory (AD) environment. They fly under the radar scoping out […]

Stealthbits Introduces Automated Machine Learning to Data Access Governance at NetApp Insight

| Tuula Fai | Uncategorized | Leave a Comment

Stealthbits CTO, Jonathan Sander, recently returned from a road trip across the U.S. where he met with several customers. One of them remarked that finding sensitive data across his organization was like trying to find Waldo in the children’s book series, Where’s Waldo. The customer went on to say, ‘Even if we find it, we […]

See a File Activity Monitor Demo without Leaving Your Desk

File Activity Monitoring Organizations spend thousands, if not millions of dollars, on their data storage infrastructure. However, many lack visibility into file activity on Network-attached storage (NAS) devices like NetApp, Dell EMC, and Hitachi—as well as Windows devices. This is because native auditing can present challenges like configuration complexity, undifferentiated events, and performance issues. As […]

Gain Visibility into the Most Important Activity on Your Network with File Activity Monitoring

File Activity Monitoring With Russia’s suspected hacking of the U.S. elections still in the news, our office conversation turned to the topic of Edward Snowden. One of our executives commented that even with the billions the government spent on cybersecurity—including technologies like User and Entity Behavior Analytics (UEBA)—officials still don’t know exactly what information Snowden […]

StealthAUDIT 8.0: Active Directory Permissions Analyzer

Active Directory Permissions The release of StealthAUDIT 8.0 delivers enhanced Active Directory (AD) Permissions analysis capabilities. This is welcome news to the over 90% of organizations that use Active Directory to control who can access their network and resources. I say welcome because there are so many different ways to grant privileged access to AD […]

Stealthbits ProTip: 3 Steps to Control Local Administrator Access

Controlling Local Administrator Access Local administrative access is necessary for IT staff to perform tasks like installing software and fixing server and desktop issues. Often users outside IT also end up with local admin rights so they too can install software on their own machines or make other configuration changes. However, many organizations lack processes […]

3 Ways to Improve Your Security Posture by Extending IAM into Unstructured Data and PAM

Laying the Groundwork for a Success IAM Deployment Implementing an Identity and Access Management (IAM) solution is a complex undertaking that involves significant investment in time and resources. As a result, project leaders are laser-focused on extending IAM’s footprint to accomplish three goals: Strengthen their security posture Maximize technology value Increase Return on Investment With […]

IoT is Fantastic. But Are We Missing a Step in Cybersecurity? Cybersecurity Luminary Charles Tendell Interviews Stealthbits’ Brad Bussie

| Tuula Fai | Uncategorized | Leave a Comment

There will be 34 billion devices connected to the internet by 2020 – Business Insider The Internet of Things (IoT) has been a hot topic for a few years. The discussion, however, has focused more on the convenience of having ‘things’ like televisions, refrigerators, and cars connected to the Internet—rather than on their security. Cybersecurity […]

Best Practices for Auditing Active Directory

| Tuula Fai | Uncategorized | Leave a Comment

Some years ago, I worked as a software implementation consultant in the public sector. An IT Director pulled me into his office one day to ask about my team’s ERP deployment. After I answered his questions he said, “That all sounds fine. What isn’t so fine is the state of my Active Directory.” He proceeded […]

  • 1
  • 2

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL