HAWTHORNE, N.J., June 05, 2018 (GLOBE NEWSWIRE) — STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced the release of STEALTHbits Activity Monitor 3.0.
The sheer volume of unstructured data created by most enterprises presents significant monitoring challenges. Understanding who is accessing data and how it is being accessed is one of the largest gaps in data security protection programs. Activity monitoring provides the robust compliance and security coverage necessary for protecting your data, without the drawbacks associated with native auditing. To control the critical information stored in Windows file shares, SharePoint and Network-Attached Storage (NAS) devices such as NetApp, Dell EMC, Hitachi and Nasuni, it is necessary to be able to track the access and change events that are constantly occurring.
STEALTHbits Activity Monitor 3.0 provides operational efficiencies and visibility into a wide spectrum of human and machine data interactions with a standardized format. With the introduction of SharePoint into STEALTHbits Activity Monitor, customers are able to meet a new level of operational and security intelligence that is not available natively within SharePoint.
“Providing our customers with increased visibility into human and machine activities has been a core goal of ours, so they can track the activity within large data stores, protect data from unauthorized access, and enrich their SIEMs with activity data,” said Gabriel Gumbs, STEALTHbits VP of Product Strategy.
In addition to STEALTHbits Activity Monitor, STEALTHbits is also excited to announce the release of StealthINTERCEPT 5.1, providing superior Active Directory protection from modern attacks such as DC SYNC and Forged Privileged Account Certificates (PACs), while also providing operational control of Active Directory. StealthINTERCEPT also incorporates policy driven controls to allow organizations to see threats, both malicious and accidental, as they happen – preventing accidental changes, blocking malicious activity and alerting in real-time.
STEALTHbits Activity Monitor 3.0 and StealthINTERCEPT 5.1 are available immediately. To learn more, we invite you to register for our upcoming webinars. Or, to arrange a private demonstration, please contact us at email@example.com.
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits Technologies Inc., is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.
A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/967fec77-8758-4cd1-aadd-ea7c7e2de6e7