Browsed by
Author: adam-rosen

Adam Rosen serves as Vice President of Data Access Governance at STEALTHbits. An expert on managing and securing unstructured data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity at STEALTHbits, he manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information.
STEALTHbits Pro Tip – Eliminating Weak Active Directory Passwords

STEALTHbits Pro Tip – Eliminating Weak Active Directory Passwords

Here’s a quick way to identify accounts with bad passwords in your Active Directory (AD). If you’re running StealthAUDIT for Active Directory, this is a very effective yet low-effort way to eliminate compromised passwords from your domain. Finding the bad passwords: From your web browser, click through the report tree down to the Active Directory>Users section. The report you want is called ‘Weak Password Checks.’ One of the checks in this report performs a hash comparison between your AD passwords…

Read More Read More

StealthAUDIT 8.0 is Here!

StealthAUDIT 8.0 is Here!

This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier! StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware. Also new in this release, we’ve added Optical Character Recognition…

Read More Read More

5 Challenges with Combining Data Access Governance and Identity Access Management

5 Challenges with Combining Data Access Governance and Identity Access Management

In a recent webinar, I discussed the five challenges that are faced when combining Data Access Governance and Identity and Access Management. The Identity Access Management Blindspot Unstructured data represents a significant risk for every organization. The files spread across file systems, SharePoint sites, and cloud applications continue to grow at a rapid pace, making it difficult to enforce proper security measures. For years, organizations have relied upon Identity and Access Management (IAM) solutions to provision users and manage access…

Read More Read More

Optimizing Your Data Governance Strategy for EU GDPR

Optimizing Your Data Governance Strategy for EU GDPR

With European Union General Data Protection Regulation (EU GDPR) set to take effect on May 25, 2018, the proper handling of personal data is more critical than ever. Last April, my colleague, Mark Wilson, explained exactly how the new regulations will impact US and multi-national companies that process personal data of EU citizens. Among the highlights are breach notification within 72 hours and astronomical fines for non-compliance. Here are some strategies savvy organizations are implementing to detect and prevent the sort…

Read More Read More

Market Trends: Data Access Governance

Market Trends: Data Access Governance

Excessive access to unstructured data is pervasive in enterprise file environments around the world. In a recent report, 62% of the business users surveyed reported having access to content they should not be able to view. In light of recent breaches, malware attacks, and insider theft, many organizations now recognize that Access Governance is critical to protecting their businesses. Here are a few of the top reasons companies are getting serious about implementing a least-privileged approach. Ransomware: Ransomware attacks have…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.