HAWTHORNE, NJ--(Marketwired - Oct 18, 2016) - STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced today the newest release of its award-winning StealthINTERCEPT real-time change and access monitoring solution.
"Every major data breach has two things in common -- the theft of credentials and data. With this release of StealthINTERCEPT, we give organizations two new and very powerful weapons to protect both," said Mark Wilson, Director of Product Management for STEALTHbits Technologies. "When accounts are compromised by attackers, there are no native mechanisms to prevent the attacker from accessing any resources the account has legitimate access to, with the exception of disabling the account altogether. With StealthINTERCEPT's visibility into every Kerberos and NTLM authentication, ability to control which resources particular accounts can authenticate from or to, and detect authentication activities indicative of compromised credentials, organizations can stop active attacks in their tracks by blocking Active Directory accounts from authenticating from or to these resources."
Augmenting StealthINTERCEPT's authentication blocking capabilities, this newest release also protects an organization's unstructured data by providing automatic file system activity blocking for users exhibiting suspicious activity on Windows File Systems. "Once ransomware, external attackers, and internal bad actors have gained access to file systems, there is often little that can be done to stop an attack in progress. This often results in significant, costly data loss and destruction," continued Wilson. "StealthINTERCEPT enables organizations to monitor the file activity events on their Windows file servers and shares without any reliance on native logging so they not only detect indicators of compromise in real-time, but automatically block the attack from proceeding any further. The result is immediate detection of destructive attacks with minimal damage or loss to the business."
For Exchange, StealthINTERCEPT 4.0 adds operation-level monitoring for critical activities such as messages read, attachments accessed or forwarded, deletions, and other indicators of compromise or abuse, to its existing capabilities that monitor, control, and alert on Exchange mailbox access events and permission changes in real-time, without any reliance on native auditing.
Version 4.0 of StealthINTERCEPT is available immediately. To learn more, we invite you to register here for our webinar demonstrating the latest version of StealthINTERCEPT on Thursday, November 3. Or, to arrange a private demonstration, contact us at email@example.com.
ABOUT STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.
For more information, visit http://www.stealthbits.com, email firstname.lastname@example.org, or call +1-201-447-9300.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.