DATI E CREDENZIALI

PROTEGGERE I TARGET PIU’ VULNERABILI
Stealthbits is the only cybersecurity solutions provider focused not only on protecting an organization’s sensitive data, but the credentials that supply access to it.

Learn why our approach is what truly sets us apart.

Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

ACUNETIX PREMIUM

ACUNETIX 360

StealthAUDIT®
MANAGEMENT PLATFORM

Raccolta agentless dei dati. Potenti strumenti di analisi. Correzioni globali. La risposta a tutte le vostre domande.

La piattaforma di gestione StealthAUDIT è la spina dorsale della famiglia di soluzioni di STEALTHbits. La sua architettura aperta, il basso impatto, e le sue potenti capacità di raccolta dei dati assicurano la flessibilità necessaria per produrre informazioni di valore in ogni ambiente IT.

StealthAUDIT automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems.

AD Inventory & Collection – Tutto comincia da Active Directory. Vengono raccolti tutti gli oggetti, impostazioni, configurazioni e permessi da Active Directory. Questi vengono poi correlati con metadati, informazioni sull’attività e permessi dai sistemi a cui AD controlla l’accesso.

Architettura Agentless – La gran parte dei dati di StealthAUDIT proviene da scansioni agentless e raccolta dei log. Questo permette la raccolta remota di migliaia di data point attraverso dozzine di sistemi e di applicazioni, riducendo l’impatto sull’ambiente IT.

Velocità e scalabilità – Questa architettura a basso profilo, unita con potenti scansioni, permette alla soluzione di scalare fino ai più vasti ambienti IT, ed essere eseguita a velocità molto elevate.

Analisi flessibile – I dati raccolti da StealthAUDIT vengono immagazzinati in un database SQL, che permette la maggiore flessibilità durante l’analisi dei dati stessi. I moduli di analisi permettono anche a utenti non esperti di SQL di interagire con i dati come se fossero utenti SQL provetti.

Interazione e remediation – StealthAUDIT offre agli utenti diverse opzioni per la remediation di problemi scoperti durante le scansioni, da singole operazioni a operazioni di remediation di massa / globali. Un’interfaccia intuitiva guida l’utente che riesce così a svolgere con semplicità queste operazioni.

RACCOLTA
Rendere sicuro l’accesso ai dati inizia con l’accedere ai dati

StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365. Leveraging an agentless architectural approach, each “Data Collector” provides an easy, wizard-driven interface for configuring StealthAUDIT to collect exactly the data needed, enabling fast, flawless, lightest-weight possible data collection from dozens of data sources.

ANALISI
Una prospettiva più fresca sui dati

StealthAUDIT Analysis Modules allow users to easily derive information from their data. Capabilities include correlation with existing and alternative data sources, easy-to-use view creation, historical trending, injection of business rules and logic, notification, exportation, and more. Users can also extend analysis with powerful SQL and PowerShell modules, as well as alternative script inputs and exits.

GOVERNANCE
Automatizzare il minor privilegio necessario

Not all data can be obtained from a system or application. When input and answers are required from data and resource owners, StealthAUDIT provides both simple and sophisticated methods of retrieving and incorporating end-user feedback into the data analysis and decision-making process, including Entitlement Reviews, Self-Service Access Requests, and more.

REMEDIATION
Non trovare e basta. Risistema.

StealthAUDIT’s Action Module framework serves as both a means by which to communicate with and receive feedback from end users, as well as automatically or programmatically remediate conditions across virtually every corner of your organization. Fix access, clean-up stale data, feed ticketing systems, tie processes together seamlessly, and more with StealthAUDIT’s open, flexible action facilities.

REPORT
Una prospettiva più fresca sui dati

StealthAUDIT provides multiple ways to interact with your collected and analyzed data, including report generation and distribution to the appropriate parties in your organization. Beautiful HTML5 renderings of any scenario make understanding your environment simple for users at any level of your business, on virtually any device.

StealthDEFEND®
REAL-TIME THREAT DETECTION & RESPONSE

Instant Insight Into Suspicious Activity

Detect and respond to abnormal behavior and advanced attacks against Active Directory and File Systems with unprecedented accuracy and speed.

Every attacker is after the same two things; credentials and data.

Once inside, attackers aim to discover your environment, find and compromise privileged credentials, and leverage those credentials to access, exfiltrate, or destroy data.

StealthDEFEND is the only real-time threat detection and response solution purpose-built to protect these two common denominators in every breach scenario.

StealthDEFEND
User and Entity Behavior Analytics (UEBA) for Threat Detection

Despite millions of dollars spent in security software and hardware, data breach events still occur daily. Organizations are now turning to advanced data science and machine learning through user and entity behavior analytics to get ahead of the game. Those serious about protecting their sensitive data and other resources from real threats like pass the hash and pass the ticket leverage StealthDEFEND to detect and disable compromised and abused accounts.

StealthDEFEND combines user behavior analytics and machine learning with access auditing and sensitive data discovery to not only detect abnormal account behavior, but accurately assess the risk associated with such behavior.

Authentication-Based Attack Detection – StealthDEFEND detects attempts to use common attack vectors to either gain initial access to, or propagate through, an environment. Examples of these attacks include: Brute Force, Lateral Movement, Golden Ticket, Account Hacking, Breached Passwords.
Malicious Insider Identification – StealthDEFEND detects shifts in behavioral patterns of users and correlates them with the user access information to determine the potential risk they pose to the organization’s data.
Privileged Account Abuse Detection – Accounts with elevated permissions have the ability to access and change virtually anything in the environment. StealthDEFEND identifies accounts with elevated permissions and monitors their behavior for abnormalities that can indicate compromise or abuse.
Ransomware & Malware Discovery – StealthDEFEND detects unusual or abnormally high file system activity in short timeframes, as well as operations associated with ransomware presence, such as the creation of files with specific names and file extensions.
Data Exfiltration Discovery – By monitoring for unauthorized access attempts to sensitive data and mailboxes, StealthDEFEND protects against users trying to steal valuable information.

ADVANCED ATTACK DETECTION

Detect and respond to the specific tactics, techniques, and procedures (TTPs) attackers are leveraging when attempting to compromise Active Directory and File System data.

AUTOMATED CONTEXT INJECTION

Automatic tagging of privileged users, groups, data, and resources appropriately adjusts risk ratings associated with abnormal or nefarious behaviors.

RESPONSE PLAYBOOKS

Automatically or programmatically respond to threats the instant they’re detected using an extensive catalog of preconfigured and customizable response actions. These response playbooks can be easily shared across the organization to standardize threat responses.

USER-DEFINED THREATS

Define threats and their parameters in alignment with your organization’s specific needs and requirements. Reduce false positives by setting thresholds for how often an activity occurs before action is taken.

REMEDIATION
Non trovare e basta. Risistema.

StealthAUDIT’s Action Module framework serves as both a means by which to communicate with and receive feedback from end users, as well as automatically or programmatically remediate conditions across virtually every corner of your organization. Fix access, clean-up stale data, feed ticketing systems, tie processes together seamlessly, and more with StealthAUDIT’s open, flexible action facilities.

REPORT
Una prospettiva più fresca sui dati

StealthAUDIT provides multiple ways to interact with your collected and analyzed data, including report generation and distribution to the appropriate parties in your organization. Beautiful HTML5 renderings of any scenario make understanding your environment simple for users at any level of your business, on virtually any device.

StealthAUDIT® MANAGEMENT PLATFORM

Raccolta agentless dei dati. Potenti strumenti di analisi. Correzioni globali. La risposta a tutte le vostre domande.

La piattaforma di gestione StealthAUDIT è la spina dorsale della famiglia di soluzioni di STEALTHbits. La sua architettura aperta, il basso impatto, e le sue potenti capacità di raccolta dei dati assicurano la flessibilità necessaria per produrre informazioni di valore in ogni ambiente IT.

StealthAUDIT automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems.

AD Inventory & Collection – Tutto comincia da Active Directory. Vengono raccolti tutti gli oggetti, impostazioni, configurazioni e permessi da Active Directory. Questi vengono poi correlati con metadati, informazioni sull’attività e permessi dai sistemi a cui AD controlla l’accesso.

Architettura Agentless – La gran parte dei dati di StealthAUDIT proviene da scansioni agentless e raccolta dei log. Questo permette la raccolta remota di migliaia di data point attraverso dozzine di sistemi e di applicazioni, riducendo l’impatto sull’ambiente IT.

Velocità e scalabilità – Questa architettura a basso profilo, unita con potenti scansioni, permette alla soluzione di scalare fino ai più vasti ambienti IT, ed essere eseguita a velocità molto elevate.

Analisi flessibile – I dati raccolti da StealthAUDIT vengono immagazzinati in un database SQL, che permette la maggiore flessibilità durante l’analisi dei dati stessi. I moduli di analisi permettono anche a utenti non esperti di SQL di interagire con i dati come se fossero utenti SQL provetti.

Interazione e remediation – StealthAUDIT offre agli utenti diverse opzioni per la remediation di problemi scoperti durante le scansioni, da singole operazioni a operazioni di remediation di massa / globali. Un’interfaccia intuitiva guida l’utente che riesce così a svolgere con semplicità queste operazioni.

RACCOLTA
Rendere sicuro l’accesso ai dati inizia con l’accedere ai dati

StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365. Leveraging an agentless architectural approach, each “Data Collector” provides an easy, wizard-driven interface for configuring StealthAUDIT to collect exactly the data needed, enabling fast, flawless, lightest-weight possible data collection from dozens of data sources.

ANALISI
Una prospettiva più fresca sui dati

StealthAUDIT Analysis Modules allow users to easily derive information from their data. Capabilities include correlation with existing and alternative data sources, easy-to-use view creation, historical trending, injection of business rules and logic, notification, exportation, and more. Users can also extend analysis with powerful SQL and PowerShell modules, as well as alternative script inputs and exits.

GOVERNANCE
Automatizzare il minor privilegio necessario

Not all data can be obtained from a system or application. When input and answers are required from data and resource owners, StealthAUDIT provides both simple and sophisticated methods of retrieving and incorporating end-user feedback into the data analysis and decision-making process, including Entitlement Reviews, Self-Service Access Requests, and more.

REMEDIATION
Non trovare e basta. Risistema.

StealthAUDIT’s Action Module framework serves as both a means by which to communicate with and receive feedback from end users, as well as automatically or programmatically remediate conditions across virtually every corner of your organization. Fix access, clean-up stale data, feed ticketing systems, tie processes together seamlessly, and more with StealthAUDIT’s open, flexible action facilities.

REPORT
Una prospettiva più fresca sui dati

StealthAUDIT provides multiple ways to interact with your collected and analyzed data, including report generation and distribution to the appropriate parties in your organization. Beautiful HTML5 renderings of any scenario make understanding your environment simple for users at any level of your business, on virtually any device.

StealthINTERCEPT

Change and Access Auditing | Real-Time Alerting

Continua

Active Directory (AD), File Systems, and Exchange are giant figures on any organization’s threat surface. However, most organizations lack visibility and control over changes and activities taking place in these environments, resulting in major security and operational risks.

StealthINTERCEPT provides crystal clear visibility into activity and changes, and safeguards your organization against malicious and unintended changes made in Active Directory, File Systems, and Exchange.

By intercepting and inspecting all Active Directory, Exchange, and File System traffic at the source, StealthINTERCEPT generates security and operational intelligence in real-time that could never previously be obtained using native logs, utilities, or third-party products.

Detect & Prevent Changes & Advanced Threats

  • AD object & GPO modifications, creations, deletions, and moves
  • File System access & permissions
  • Exchange Non-Owner Mailbox access
  • Authentication-based Attacks (Brute Force, Lateral Movement, Account Hacking, and more)
  • Crypto Ransomware & File Exfiltration
  • Privileged Account Use and Abuse

STEALTHbits File Activity Monitor

Solo i dati. Semplice, efficace, conveniente.

Continua

The STEALTHbits File Activity Monitor is a simple to install, easy to use, affordable solution that monitors and stores file activity for Windows File Servers and NAS devices (NetApp, EMC, Hitachi), without any reliance on native logging. The solution is designed to provide users with:

  • The ability to collect all or specific file activity for specific values or specific combinations of values
  • A clean, simple UI to view the results of the queries executed against the data
  • The ability to feed file activity data to alternative technologies like SIEM and/or export data in formats that are easy to understand and work with.

Collect up to 17 different event types across files and folders and at any scope. With streamlined data gathering, you’ll not only get the details of every event, but at a fraction of the size compared to native event logs.

Richiedi informazioni


  • Questo campo serve per la convalida e dovrebbe essere lasciato inalterato.