Welcome!

News Feed Item

STEALTHbits Technologies Announces Release of StealthINTERCEPT Version 3.0

HAWTHORNE, NJ -- (Marketwired) -- 06/09/14 -- STEALTHbits Technologies, Inc., leading supplier of software solutions for managing and securing unstructured data and critical applications, today announced the version 3.0 release of their real-time security interception product, StealthINTERCEPT. StealthINTERCEPT is the security auditing and enforcement arm of the STEALTHbits Active Directory management suite, in addition to File Systems and Microsoft Exchange Server.

Organizations that are awakening to insider threats require controls to meet audit and compliance requirements. StealthINTERCEPT provides an unprecedented level of visibility into security threats like brute force attacks, malware account hijacking, and data theft. By intercepting events in real-time at the lowest possible level (the operating system security authorization layer), StealthINTERCEPT provides:

  • Deeper insight into security events than otherwise possible
  • Low overhead, highly efficient security auditing
  • Organizational policy enforcement, overriding even administrator level control

New for version 3.0, StealthINTERCEPT provides a new "Investigations" feature that allows security admins the ability to explore enterprise wide events and surfacing patterns of activity that would otherwise be missed. Additional features for version 3.0 include:

  • SIEM integration with all major SIEM vendors for "single pane of glass" view that enhances the risk analysis conducted in SIEM through a new Advanced Threat Detection (ATD) framework
  • Support for Exchange 2013 non-owner mailbox auditing
  • Integrated self-auditing to prove compliance to auditors
  • Windows integrated security for enhanced administration and control
  • Automated Agent management, deployment and control

As Oliver Rochford, Research Director, Gartner Inc. & Kelly M. Kavanagh, Principal Research Analyst, Gartner Inc. state in the March 12, 2014 report Using SIEM for Targeted Attack Detection, "There is a need to monitor the activities of everyone who has privileged levels of access to the organization's systems and data to discover internal threats and to discover the postbreach activities of a successful targeted attack." They go on to write, "This need to acquire higher privileges is an Achilles' heel for an attacker. It inevitably generates noise that can give them away."

StealthINTERCEPT v3.0 is available worldwide June 9th, 2014.

EXECUTIVE QUOTE

Kyle Kennedy, Chief Technology Officer, STEALTHbits Technologies
"The capabilities we've built into StealthINTERCEPT v3.0 drastically increase the risk context any organization's SIEM application can consume compared to native logging. In particular, our ability to monitor privileged user activity in real-time and at greater depths than is otherwise possible will not only provide better data for advanced threat detection, but make it significantly harder for attackers to obtain higher levels of privilege without being detected."

ADDITIONAL RESOURCES
For more information about StealthINTERCEPT, visit http://www.stealthbits.com/products/stealthintercept

ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.

Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, drew upon his own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He also discussed the implementation of microservices in data and application integrat...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, will explore the value of Kibana 4 for log analysis and will give a real live, hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He will examine three use cases: IT operations, business intelligence, and security and compliance. This is a hands-on session that will require participants to bring their own laptops, and we will provide the rest.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Updating DevOps to the latest production data slows down your development cycle. Probably it is due to slow, inefficient conventional storage and associated copy data management practices. In his session at @DevOpsSummit at 20th Cloud Expo, Dhiraj Sehgal, in Product and Solution at Tintri, will talk about DevOps and cloud-focused storage to update hundreds of child VMs (different flavors) with updates from a master VM in minutes, saving hours or even days in each development cycle. He will also...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, will highlight the current challenges of these transformative technologies and share strategies for preparing your organization for these changes. This “view from the top” will outline the latest trends and developm...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...