Browsed by
Author: Damon Tepe

Damon is the Director of Product Marketing at STEALTHbits responsible for Active Directory and Privileged Access Management solutions. He has over 20 years of experience addressing marketing challenges of all kinds for many notable, B2B software companies, including Red Hat, Quest Software, Sterling Commerce, and most recently SecureAuth. Damon has a passion for cybersecurity software and improving the defenses of organizations against cyber-attacks. Damon resides in Columbus, Ohio.
Improve the Efficiency and Automation of AD Object Rollback and Recovery in StealthRECOVER 1.5

Improve the Efficiency and Automation of AD Object Rollback and Recovery in StealthRECOVER 1.5

Why is Active Directory (AD) so Important to Protect? The health and operational integrity of AD has a direct impact on the overall security of your organization. The capability to rollback and recover from unwanted changes is a critical requirement for you to maintain the security and performance of your network. In fact – it’s never been more important. 90% of organizations use AD as their central hub of authentication and authorization. It literally holds the keys to the kingdom…

Read More Read More

Improve AD Security – Block Unauthorized Activities & Strengthen Passwords with StealthINTERCEPT 7.0

Improve AD Security – Block Unauthorized Activities & Strengthen Passwords with StealthINTERCEPT 7.0

Nearly everyone uses Microsoft’s Active Directory (AD), over 90% in fact[1], to manage user accounts and provide authentication and access to the majority of organizational resources. Microsoft tells us that 95 million AD accounts are under attack every day[2]. The latest Verizon Data Breach Investigations Report informs that 56% of breaches in 2018 took a month or longer to discover[3]. Being under constant attack, and taking months to discover it, is a recipe for disaster. Many organizations do some kind…

Read More Read More

Redefining How Privileged Access is Granted – STEALTHbits Privileged Activity Manager 1.3

Redefining How Privileged Access is Granted – STEALTHbits Privileged Activity Manager 1.3

Privileged access will always appeal to cyber attackers because of the access rights associated with these accounts. Despite significant investments in Privileged Access Management (PAM) technologies, privileged accounts are still massively overexposed. Traditional PAM providers have focused on controlling access to accounts and their passwords, not on the activities that need to be performed. Go Vault-less Many PAM vendors and their deployments require a password vault, choosing to focus on controlling access to privileged accounts via rotating and vaulting passwords….

Read More Read More

StealthDEFEND 2.2 – Blocking Threats without an Army of Analysts

StealthDEFEND 2.2 – Blocking Threats without an Army of Analysts

Data Breaches continue to rise 30-40% every year and attackers continue to advance their techniques to infiltrate organizations exploiting vulnerabilities to gain access to sensitive data. Organizations concerned about data breaches and the rising costs to remediate them, need advanced solutions to identify and combat these ever-increasing attacks. As attacks increasingly occur, organizations are struggling to find sufficient security talent: “Nearly Half of Organizations Lack the Necessary Talent to Maintain Security Measures” – Industry News, March 20, 2019. “Most Organizations…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.