SOURCE: STEALTHbits Technologies

STEALTHbits Technologies

February 11, 2015 15:33 ET

Active Directory Firewall Protects Against Today's Threats, Enabling Security Intelligence

STEALTHbits Technologies Releases StealthINTERCEPT® v3.3 -- Real-Time Windows Change and Access Auditing, and Windows Security Intelligence Solution

HAWTHORNE, NJ--(Marketwired - Feb 11, 2015) - STEALTHbits Technologies, Inc., today announced the release of StealthINTERCEPT® v3.3, a firewall technology designed to detect and alert on threats like Pass the Hash (PtH) and Brute Force attacks. Through real-time interception and analysis of Active Directory change and authentication traffic, StealthINTERCEPT detects and alerts on today's threats, as publicized in the media. Using an award-winning, innovative approach, StealthINTERCEPT provides customers a platform-agnostic solution for detecting threats without the need for endpoint agents.

Market demand for specialized Advanced Threat Detection (ATD) and Privileged Identity Management (PIM) technologies has risen in response to steadily increasing breach event occurrences, many of which have manifested from exploits within internal systems leveraging compromised administrative credentials.

The release highlights several key feature enhancements and the announcement of new technology partnerships with industry-leading Security Information and Event Management (SIEM) vendors including HP (ArcSight®), McAfee® (ESM -- formerly Nitro), and RSA® (Security Analytics). In recognition of an existing integration with IBM's QRadar SIEM, STEALTHbits was also today presented the IBM Beacon Award for security innovation.

"StealthINTERCEPT is a first of its kind firewall for Active Directory. It is a protective boundary that provides enhanced security and intelligence," said Adam Laub, STEALTHbits' Vice President. "It intercepts all traffic and provides pre-emptive insight into serious security events as they're unfolding -- like a canary in a coal mine." 

Organizations have traditionally relied on native Windows logging facilities to obtain details about changes to access and configuration, in addition to authentication and authorization activity, but have struggled to obtain meaningful, contextual, and reliable information from logging alone. 

Laub explained, "Limitations of native Windows logging itself is really the underlying reason as to why organizations have been unable to obtain actionable business risk context about their Microsoft infrastructures."

StealthINTERCEPT v3.3 -- Key Features

  • Includes capture of all Kerberos and NTLM authentication events
    • Including such details as:
      • Source and Destination IP Addresses and Host Names
      • User Account and SID
      • Both successful and failed attempts, including attempts to use non-existing accounts
  • Threat Detection Analytics Engine
    • User-configurable, in-memory threat analytics engine detects:
      • Brute Force Authentication Attacks
      • Horizontal Account Movement
      • Account Hacking
  • Improved Web Console that includes support for ad hoc investigations
  • Investigations interface for uncovering common risk scenarios such as:
    • Unauthorized Admin Activity
    • Service Account Abuse
    • Authentications against sensitive resources
    • Repeated Failed Logins
  • Dynamic Policies
    • Allows StealthINTERCEPT to integrate with third party systems
    • Automatically learn about security risks (e.g. monitor accounts and groups used to provide access to sensitive data, HR systems, etc.)
  • Certified SIEM output for leading SIEM products

Availability
StealthINTERCEPT v3.3 is available immediately worldwide.

ABOUT STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.

STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.

Contact Information