Complete solution for Data Access Governance

File Activity Monitor
- Audit file movement and permissions
- Complete audit trail with quick search
- SIEM-integration with low amount of events

StealthAUDIT analitics
- Determination of Data Admin
- Proposal for permissions and groups
- Control of the critical business datas

StealthINTERCEPT intervention
- Real-time alerts and interventions
- Rule-based and protected objects
- Against ransomwares and data erasures
More than 65% of the companies and organizations are afraid of data theft or misuse of administrator privileges. Accordint to 91% of their employees have access for those files which they don't work, and 70% of the companies are not able to monitor and audit it's privileged users.
Source: Dimensional Research, The Growing Security Threat from Insiders
StealthAUDIT
It can be installed in seconds, contains agent-free technology for the quick settlement for the permissions. The StealthAUDIT Management Platform provides the basis of the StealthBits family: with an open architecture, with database and it's flexibility can be used for many different tasks.

The StealthAUDIT operation stars with the integration of Active Directory.
Compares intelligently the file systems metadata with the AD group memberships and permissions, then it makes a proposal to the reduced permissions, elimination of AD errors, and either individual or mass changes.
All the collected datas can be used freely in a structured SQL database.
Supported platforms
Active Directory
Exchange
Sharepoint
Office365
Dropbox
File system
NAS
Systems Governance