This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier!
StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware.
Also new in this release, we’ve added Optical Character Recognition (OCR) to ensure that scanned documents and other image files are checked for sensitive information and properly secured.
New enhancements to AD permissions analysis grant unprecedented visibility into who has access to what within AD.
StealthAUDIT 8.0 also includes expanded cloud support with the addition of Box and exciting technology integrations with both CyberArk and Boldon James.
For more information on what’s new in StealthAUDIT 8.0, click here.
Don’t miss a post! Subscribe to The Insider Threat Security Blog here:
Adam Rosen serves as Vice President of Data Access Governance at STEALTHbits. An expert on managing and securing unstructured data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity at STEALTHbits, he manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information.