This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier!
StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware.
Also new in this release, we’ve added Optical Character Recognition (OCR) to ensure that scanned documents and other image files are checked for sensitive information and properly secured.
New enhancements to AD permissions analysis grant unprecedented visibility into who has access to what within AD.
StealthAUDIT 8.0 also includes expanded cloud support with the addition of Box and exciting technology integrations with both CyberArk and Boldon James.
For more information on what’s new in StealthAUDIT 8.0, click here.
Don’t miss a post! Subscribe to The Insider Threat Security Blog here:
Adam Rosen serves as Vice President of Product Strategy for Data Access Governance at Stealthbits Technologies. An expert on managing and securing data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Stealthbits’ portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information.