SOURCE: STEALTHbits Technologies

STEALTHbits Technologies

February 18, 2016 06:00 ET

OppenheimerFunds Deploys STEALTHbits to Enhance QRadar

Leading Financial Services Firm to Present Details of QRadar-STEALTHbits Integration at IBM Interconnect Show on February 23 in Las Vegas

HAWTHORNE, NJ--(Marketwired - Feb 18, 2016) - STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, today announced that Oppenheimer Funds will join STEALTHbits' Senior Vice President of Product Marketing in a joint presentation on the company's QRadar/STEALTHbits integration at IBM's annual Interconnect Conference in late February.

"QRadar is the gold standard in SIEM technology, but even QRadar can't ingest and leverage log data that doesn't exist," noted Adam Laub, STEALTHbits' Senior Vice President of Product Marketing. "STEALTHbits gathers data that can't be obtained from native log collection, applies built-in analytics to that data, and sends QRadar only relevant alerts when anomalies are detected, filtering out all the native log noise."

"STEALTHbits addresses a challenge with native log data that I've struggled with for 8 years," added Chris Morgan, OppenheimerFunds' Security Engineer. "STEALTHbits does the analytical work for me, specifically detecting modern attack vectors like horizontal account movement, the kind of technique that enables attackers to acquire privileged credentials and do the most damage."

The presentation will discuss a phased approach to deploying an APT (Advanced Persistent Threat) detection system. Added Laub, "We strongly recommend users walk before they run, starting with a configurable, rules-based system that identifies the most common and dangerous attack patterns reliably, but with a reasonable investment and light network footprint." 

Laub says that once that initial rules-based capability is solidly deployed, a User Behavior Analytics (UBA) solution can be contemplated. The more sophisticated UBA system establishes baseline user behavior patterns over an initial period, employs machine learning to constantly refine and improve the behavioral baseline, and then uses those ever-improving algorithms to alert on anomalous behavior likely indicative of a potential bad actor on the enterprises' network.

The joint presentation (session SIA-3572), "User Behavior Analytics for Insider Threat Detection at Oppenheimer Funds using IBM and STEALTHbits" is scheduled for Tuesday, February 23, from 2:30 to 3:30 in Lagoon G. To learn more about the presentation, contact, or visit

ABOUT STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit, email, or call +1-201-447-9300.

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

Contact Information