|By Marketwired .||
|June 9, 2014 07:00 AM EDT||
HAWTHORNE, NJ -- (Marketwired) -- 06/09/14 -- STEALTHbits Technologies, Inc., leading supplier of software solutions for managing and securing unstructured data and critical applications, today announced the version 3.0 release of their real-time security interception product, StealthINTERCEPT. StealthINTERCEPT is the security auditing and enforcement arm of the STEALTHbits Active Directory management suite, in addition to File Systems and Microsoft Exchange Server.
Organizations that are awakening to insider threats require controls to meet audit and compliance requirements. StealthINTERCEPT provides an unprecedented level of visibility into security threats like brute force attacks, malware account hijacking, and data theft. By intercepting events in real-time at the lowest possible level (the operating system security authorization layer), StealthINTERCEPT provides:
- Deeper insight into security events than otherwise possible
- Low overhead, highly efficient security auditing
- Organizational policy enforcement, overriding even administrator level control
New for version 3.0, StealthINTERCEPT provides a new "Investigations" feature that allows security admins the ability to explore enterprise wide events and surfacing patterns of activity that would otherwise be missed. Additional features for version 3.0 include:
- SIEM integration with all major SIEM vendors for "single pane of glass" view that enhances the risk analysis conducted in SIEM through a new Advanced Threat Detection (ATD) framework
- Support for Exchange 2013 non-owner mailbox auditing
- Integrated self-auditing to prove compliance to auditors
- Windows integrated security for enhanced administration and control
- Automated Agent management, deployment and control
As Oliver Rochford, Research Director, Gartner Inc. & Kelly M. Kavanagh, Principal Research Analyst, Gartner Inc. state in the March 12, 2014 report Using SIEM for Targeted Attack Detection, "There is a need to monitor the activities of everyone who has privileged levels of access to the organization's systems and data to discover internal threats and to discover the postbreach activities of a successful targeted attack." They go on to write, "This need to acquire higher privileges is an Achilles' heel for an attacker. It inevitably generates noise that can give them away."
StealthINTERCEPT v3.0 is available worldwide June 9th, 2014.
Kyle Kennedy, Chief Technology Officer, STEALTHbits Technologies
"The capabilities we've built into StealthINTERCEPT v3.0 drastically increase the risk context any organization's SIEM application can consume compared to native logging. In particular, our ability to monitor privileged user activity in real-time and at greater depths than is otherwise possible will not only provide better data for advanced threat detection, but make it significantly harder for attackers to obtain higher levels of privilege without being detected."
For more information about StealthINTERCEPT, visit http://www.stealthbits.com/products/stealthintercept
ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.
Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
Apr. 30, 2016 04:00 AM EDT Reads: 1,701
Apr. 29, 2016 09:15 PM EDT Reads: 320
Apr. 29, 2016 09:00 PM EDT Reads: 1,545
Apr. 29, 2016 08:30 PM EDT Reads: 1,750
Apr. 29, 2016 07:30 PM EDT Reads: 2,403
Apr. 29, 2016 05:15 PM EDT Reads: 1,698
Apr. 29, 2016 04:30 PM EDT Reads: 1,779
Apr. 29, 2016 04:30 PM EDT Reads: 641
Apr. 29, 2016 03:45 PM EDT Reads: 1,630
Apr. 29, 2016 03:30 PM EDT Reads: 1,671
Apr. 29, 2016 03:15 PM EDT Reads: 1,553
Apr. 29, 2016 03:00 PM EDT Reads: 866
Apr. 29, 2016 02:45 PM EDT Reads: 876
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Apr. 29, 2016 02:30 PM EDT Reads: 1,410