STEALTHbits Introduces a New Level of Operational and Security Intelligence with the Launch of STEALTHbits Activity Monitor 3.0

STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced the release of STEALTHbits Activity Monitor 3.0.

The sheer volume of unstructured data created by most enterprises presents significant monitoring challenges. Understanding who is accessing data and how it is being accessed is one of the largest gaps in data security protection programs. Activity monitoring provides the robust compliance and security coverage necessary for protecting your data, without the drawbacks associated with native auditing. To control the critical information stored in Windows file shares, SharePoint and Network-Attached Storage (NAS) devices such as NetApp, Dell EMC, Hitachi and Nasuni, it is necessary to be able to track the access and change events that are constantly occurring.

STEALTHbits Activity Monitor 3.0 provides operational efficiencies and visibility into a wide spectrum of human and machine data interactions with a standardized format. With the introduction of SharePoint into STEALTHbits Activity Monitor, customers are able to meet a new level of operational and security intelligence that is not available natively within SharePoint.

“Providing our customers with increased visibility into human and machine activities has been a core goal of ours, so they can track the activity within large data stores, protect data from unauthorized access, and enrich their SIEMs with activity data,” said Gabriel Gumbs, STEALTHbits VP of Product Strategy.

In addition to STEALTHbits Activity Monitor, STEALTHbits is also excited to announce the release of StealthINTERCEPT 5.1, providing superior Active Directory protection from modern attacks such as DC SYNC and Forged Privileged Account Certificates (PACs), while also providing operational control of Active Directory. StealthINTERCEPT also incorporates policy driven controls to allow organizations to see threats, both malicious and accidental, as they happen – preventing accidental changes, blocking malicious activity and alerting in real-time.