Netwrix and Stealthbits merge to better secure sensitive data. LEARN MORE
Stealthbits

StealthAUDIT 8.0 is Here!

Blog >StealthAUDIT 8.0 is Here!

This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier!

StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware.

Also new in this release, we’ve added Optical Character Recognition (OCR) to ensure that scanned documents and other image files are checked for sensitive information and properly secured.

New enhancements to AD permissions analysis grant unprecedented visibility into who has access to what within AD.

StealthAUDIT 8.0 also includes expanded cloud support with the addition of Box and exciting technology integrations with both CyberArk and Boldon James.

For more information on what’s new in StealthAUDIT 8.0, click here.


Don’t miss a post! Subscribe to The Insider Threat Security Blog here:

Loading

Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!

 

Loading

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL