This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier!
StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware.
Also new in this release, we’ve added Optical Character Recognition (OCR) to ensure that scanned documents and other image files are checked for sensitive information and properly secured.
New enhancements to AD permissions analysis grant unprecedented visibility into who has access to what within AD.
StealthAUDIT 8.0 also includes expanded cloud support with the addition of Box and exciting technology integrations with both CyberArk and Boldon James.
For more information on what’s new in StealthAUDIT 8.0, click here.
Adam Rosen serves as Vice President of Data Access Governance at Stealthbits – now part of Netwrix. An expert on managing and securing unstructured data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity at Stealthbits, he manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.Read more
Start a Free Stealthbits Trial!
No risk. No obligation.