SOURCE: STEALTHbits Technologies

STEALTHbits Technologies

August 01, 2016 06:00 ET

STEALTHbits Places Controlling and Securing Credentials and Data in the Forefront With Latest StealthAUDIT Release

HAWTHORNE, NJ--(Marketwired - Aug 1, 2016) - STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced the latest release of its flagship data access governance solution, StealthAUDIT®, placing a spotlight on controlling and securing credentials and data.

"This release is all about securing credentials and data; the two things every attacker is targeting, regardless of how they got it, or if they were on the inside to begin with," said Adam Laub, STEALTHbits' Senior Vice President of Product Marketing. "We're continuing to place a high priority on allowing our clients to lock down the information that matters most to them, and the accounts that provide access to that information."

StealthAUDIT is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting.

Version 7.2 enhances security in a variety of ways.

Said Laub, "We added a brand new solution set that automates the discovery of privileged accounts across Unix and Linux infrastructures, which when combined with the visibility StealthAUDIT already offers into local admin access across all Windows endpoints, acts as a one-stop-shop into understanding all administrative access to systems in the environment." Added Laub, "There's also now a new review workflow in the Access Information Center that performs reviews specifically on sensitive data with your data owners, allowing users to easily govern sensitive data and make proper decisions about how to lock it down."

In addition to adding brand new workflows to help identify and remediate stale data, six new threat models including Ransomware, Sensitive Data Activity, Stale File Activity, User Share Activity, Peer Group Activity, and Modified Binaries have been added to alert users about statistically significant deviations from normal user activity.

Upgrades for v7.2 of StealthAUDIT will be available starting August 15th.  For the full list of features and enhancements in v7.2, we invite you to visit To arrange a private demonstration, please contact us at

ABOUT STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit, email, or call +1-201-447-9300.

Contact Information