Announcing StealthAUDIT 8.2 General Availability

Announcing StealthAUDIT 8.2 General Availability

Back at the end of October, we gave you a sneak peek at the new features coming in StealthAUDIT 8.2, and now you can see it for yourself!  8.2 is now on our website so you can go have a look for yourself at https://www.stealthbits.com/new-stealthaudit-release. StealthAUDIT 8.2 has the following new features and enhancements: Expanded Sensitive Data Discovery capabilities and platform support Support for Nasuni UniFS Hybrid NAS storage Enhanced support for Dropbox Business to include Sensitive Data Discovery Sensitive…

Read More Read More

Part 3: Are Users Putting Your Sensitive Data at Risk?

Part 3: Are Users Putting Your Sensitive Data at Risk?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Are Users Putting Your Sensitive Data at Risk? Previously in this blog series, we talked about understanding your organization’s data footprint. We also discussed methodologies for identifying where sensitive data exists. At this point, you’re probably realizing how much data lives across your organization and wondering… who is accessing all this information? The concern now isn’t solely about the data itself, but rather that users within…

Read More Read More

Part 2: Is Your Unstructured Data Safe?

Part 2: Is Your Unstructured Data Safe?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Is Your Unstructured Data Safe? In Part 1 of this blog series, we uncovered a lurking fear among administrators everywhere: the unknown of unstructured data. Over 60% of people do not know where their unstructured data lives across their organization. This is particularly scary because unstructured data accounts for over 80% of all data within any organization. Fortunately, as we discussed previously, there are tried and…

Read More Read More

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study

Part 1: Do You Know Where Your Data Lives? Thinking of all the data that lives across your organization? It’s a spooky thought. According to a recent Ponemon study on the current state of Data Access Governance (DAG), 62% of people have no confidence or little confidence of where users are storing unstructured data. On the surface, it might seem like a daunting task to figure out where all your data lives. However, with the right tools and a plan,…

Read More Read More

STEALTHbits ProTip: Role Based Access for Web Reporting in StealthAUDIT v8.1

STEALTHbits ProTip: Role Based Access for Web Reporting in StealthAUDIT v8.1

This time of year is typically a time of giving, and I am here to give the gift of report security!  StealthAUDIT v8.1 has new data to discover, and new report management to keep that data secure. Version 8.1 of StealthAUDIT now equips users with Role Based Access (RBA) to control who has access to reports from the Web Console.  This is a great way to isolate reports to only the users who should be able to see the sensitive…

Read More Read More

How STEALTHbits Helps with ITAR Compliance

How STEALTHbits Helps with ITAR Compliance

What is ITAR? The International Traffic in Arms Regulations (ITAR) is a United States regulatory compliance standard that restricts and controls the export of defense and military related technologies to safeguard U.S. national security. The U.S. Government requires all manufacturers, exporters, and brokers of defense articles, defense services or related technical data to be ITAR compliant. For a company involved in the manufacture, sale or distribution of goods or services covered under the United States Munitions List (USML), or a…

Read More Read More

STEALTHbits ProTip: StealthAUDIT’s Sensitive Data Discovery for Compliance

STEALTHbits ProTip: StealthAUDIT’s Sensitive Data Discovery for Compliance

With compliance standards driving more and more organizations to directly tag their data, StealthAUDIT’s Sensitive Data Discovery allows you to easily locate and understand the data that was important enough to tag in the first place. The configuration for sensitive data discovery is located within the Criteria Editor.  To get there navigate the Job Tree to the 1-SEEK System Scans job located in Jobs > FileSystem > 0.Collection.  Open the Query Properties as shown below: From here, select SDD Audit Criteria…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.