Today, we are introducing a new method to tackle Data Subject Access Requests (DSARs) that will enable our customers to obtain results in seconds. Available as an add-on to complement StealthAUDIT, Data Privacy Engine effectively connects identities with the location of their personal information. Thanks to the pre-discovery of attributes of data subjects across all repositories (structured, unstructured, on-premise, in the cloud, etc.) along with an understanding of which files and tables re…
Cyberattacks and data breaches are simply too common, with nearly 4,000 confirmed data breaches reported in the latest 2020 Verizon Data Breach Investigations Report. Recent news demonstrates Active Directory (AD) is under heavy attack from adversaries of all types, including nation-state sponsored and organized cybercriminal groups alike.
June 17, 2020 – North Korea’s state hackers caught engaging in BEC scams
“We found that the attackers queried the AD (Active Directo…
Typically, security is improved at the expense of convenience. Two-factor Authentication disrupts a user for another authentication factor in addition to a password. Signing-in and getting a guest badge with the lobby security guard before meeting a prospective client may be secure but is not very convenient. I could drone-on with more examples, but you get the point.
Our latest release of Stealthbits Privileged Activity Manager® (SbP…
Why is Active Directory (AD) so Important to Protect?
The health
and operational integrity of AD has a direct impact on the overall security of
your organization. The capability to rollback and recover from unwanted changes
is a critical requirement for you to maintain the security and performance of
your network.
In fact – it’s never been more important.
90% of organizations use AD as their central hub of authentication and authorization. It literally holds the keys to the kingdom …
Nearly
everyone uses Microsoft’s Active Directory (AD), over 90% in fact[1],
to manage user accounts and provide authentication and access to the majority
of organizational resources. Microsoft tells us that 95 million AD accounts are
under attack every day[2].
The latest Verizon Data Breach Investigations Report informs that 56% of
breaches in 2018 took a month or longer to discover[3].
Being under constant attack, and taking months to discover it, is a recipe for
disaster.
Many organizat…
Privileged access will always appeal to cyber attackers because of the access rights associated with these accounts. Despite significant investments in Privileged Access Management (PAM) technologies, privileged accounts are still massively overexposed. Traditional PAM providers have focused on controlling access to accounts and their passwords, not on the activities that need to be performed.
Go Vault-less
Ephemeral (temporary) Account Support = No Standing Privileges
Many PAM vendo…
Data Breaches continue to rise 30-40% every year and attackers continue to advance their techniques to infiltrate organizations exploiting vulnerabilities to gain access to sensitive data. Organizations concerned about data breaches and the rising costs to remediate them, need advanced solutions to identify and combat these ever-increasing attacks.
As attacks increasingly occur, organizations are struggling
to find sufficient security talent:
“Nearly Half of Organizations Lack the Neces…
StealthAUDIT 9.0 – Something for Everyone
If you know StealthAUDIT, you know it’s one of the most versatile technologies around for addressing a broad range of data collection and analysis, reporting, and governance needs. StealthAUDIT appeals to the requirements of multiple audiences within an organization, simultaneously facilitating successful outcomes for security, compliance, and operationally focused teams. While its usefulness to so…
When we released StealthDEFEND 2.0 earlier this year, we knew we were breaking new ground in the Active Directory security space. We had delivered a solution purpose-built to detect the most advanced attacks against Active Directory in real-time, drastically reducing time to detection while increasing the ability for organizations to respond to these attacks quickly and efficiently. The response (pun int…
There are two functional areas of Active Directory management and security that every organization struggles with; one is changing their password policies and the other is identifying the source of LDAP traffic. StealthINTERCEPT efficiently addresses both of these challenges in Version 6.1.
Password Pain? How to Improve Your Password Policy
The NIST 800-63B password guidelines walk back almost two decades of guidance about how companies should approach password security. And the realit…