|By Marketwired .||
|June 9, 2014 07:00 AM EDT||
HAWTHORNE, NJ -- (Marketwired) -- 06/09/14 -- STEALTHbits Technologies, Inc., leading supplier of software solutions for managing and securing unstructured data and critical applications, today announced the version 3.0 release of their real-time security interception product, StealthINTERCEPT. StealthINTERCEPT is the security auditing and enforcement arm of the STEALTHbits Active Directory management suite, in addition to File Systems and Microsoft Exchange Server.
Organizations that are awakening to insider threats require controls to meet audit and compliance requirements. StealthINTERCEPT provides an unprecedented level of visibility into security threats like brute force attacks, malware account hijacking, and data theft. By intercepting events in real-time at the lowest possible level (the operating system security authorization layer), StealthINTERCEPT provides:
- Deeper insight into security events than otherwise possible
- Low overhead, highly efficient security auditing
- Organizational policy enforcement, overriding even administrator level control
New for version 3.0, StealthINTERCEPT provides a new "Investigations" feature that allows security admins the ability to explore enterprise wide events and surfacing patterns of activity that would otherwise be missed. Additional features for version 3.0 include:
- SIEM integration with all major SIEM vendors for "single pane of glass" view that enhances the risk analysis conducted in SIEM through a new Advanced Threat Detection (ATD) framework
- Support for Exchange 2013 non-owner mailbox auditing
- Integrated self-auditing to prove compliance to auditors
- Windows integrated security for enhanced administration and control
- Automated Agent management, deployment and control
As Oliver Rochford, Research Director, Gartner Inc. & Kelly M. Kavanagh, Principal Research Analyst, Gartner Inc. state in the March 12, 2014 report Using SIEM for Targeted Attack Detection, "There is a need to monitor the activities of everyone who has privileged levels of access to the organization's systems and data to discover internal threats and to discover the postbreach activities of a successful targeted attack." They go on to write, "This need to acquire higher privileges is an Achilles' heel for an attacker. It inevitably generates noise that can give them away."
StealthINTERCEPT v3.0 is available worldwide June 9th, 2014.
Kyle Kennedy, Chief Technology Officer, STEALTHbits Technologies
"The capabilities we've built into StealthINTERCEPT v3.0 drastically increase the risk context any organization's SIEM application can consume compared to native logging. In particular, our ability to monitor privileged user activity in real-time and at greater depths than is otherwise possible will not only provide better data for advanced threat detection, but make it significantly harder for attackers to obtain higher levels of privilege without being detected."
For more information about StealthINTERCEPT, visit http://www.stealthbits.com/products/stealthintercept
ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.
Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
Jan. 16, 2017 08:00 PM EST Reads: 420
Jan. 16, 2017 06:45 PM EST Reads: 3,480
Jan. 16, 2017 06:00 PM EST Reads: 336
Jan. 16, 2017 05:00 PM EST Reads: 3,988
Jan. 16, 2017 03:30 PM EST Reads: 4,815
Jan. 16, 2017 03:15 PM EST Reads: 320
Jan. 16, 2017 02:30 PM EST Reads: 1,544
Jan. 16, 2017 02:15 PM EST Reads: 5,257
Jan. 16, 2017 01:45 PM EST Reads: 3,589
Jan. 16, 2017 01:30 PM EST Reads: 3,305
Jan. 16, 2017 01:00 PM EST Reads: 1,025
Jan. 16, 2017 01:00 PM EST Reads: 3,635
Jan. 16, 2017 12:30 PM EST Reads: 3,353
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, will highlight the current challenges of these transformative technologies and share strategies for preparing your organization for these changes. This “view from the top” will outline the latest trends and developm...
Jan. 16, 2017 12:30 PM EST Reads: 835
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jan. 16, 2017 12:30 PM EST Reads: 5,469