Below is an excerpt from the recent Gartner Magic Quadrant report on Identity and Access Governance.
Gartner MQ for IAG
STEALTHbits Technologies: StealthAUDIT Management Platform
Founded in 2001, this New Jersey-based firm has provided products focused on Microsoft
platforms for addressing many data access governance concerns in file systems, Microsoft Active
Directory and other collaboration applications. Additional tools in its portfolio address issues such
as Active Directory auditing and cleanup, and additional capabilities are offered for audit and
compliance in data and Microsoft application environments. STEALTHbits is included here because
of its work in data access governance and its growing role in general IAG products.
To learn more check out Report ID: G00235195
STEALTHbits Technologies was named a winner of a 2015 IBM Beacon Award for Outstanding Security Solution. Each year, this honor is awarded to a select number of IBM Business Partners who have delivered exceptional solutions to drive business value and transform the way their clients and industries do business in the future. The 2015 awards recognize achievements across a wide-range of solution areas, including, cloud, analytics, mobile, security and social business.
It’s effectively impossible to generate the level of security intelligence needed from the Microsoft infrastructure using native logging alone. When advanced threats like malware make it over the fence, StealthINTERCEPT is there to detect it quickly, before substantial damage can be done. And our seamless integration with QRadar makes it a no-brainer for IBM’s clients.
Watch the IBM interview with Kevin Foisy, Co-Founder and CTO:
Modified on by Nathan Sorrentino
Join IBM, Accuvant, and STEALTHbits for this live, interactive webinar, where we will demonstrate and discuss how:
StealthINTERCEPT® Insider Threat Detection for QRadar® provides visibility into threats unfolding within critical applications and data repositories such as Active Directory, File Systems, and Exchange, empowering QRadar customers with critical events in real time, without any reliance on native logging. With deeper insight into security events that cannot be identified using native logging alone, StealthINTERCEPT eliminates the “needle in a haystack” approach and results in significantly reduced QRadar loading, while producing richer events.
StealthINTERCEPT empowers QRadar to alert on security concerns such as:
• Is a brute force attack underway?
• Is someone hacking user accounts?
• Did someone change a sensitive group to elevate permissions?
• Have GPO settings been changed to get access?
• Is someone logging into sensitive mailboxes?
• Is a service account being used in places it shouldn’t?
Among its many benefits, StealthINTERCEPT® Insider Threat Detection for QRadar® allows organizations to correlate dissimilar events by perpetrator and source IP, generating the context required to paint the big picture. This enables QRadar to be the “single pane of glass” solution it was always meant to be; a security tool that provides the best event context and risk mitigation available.
Date: Wednesday, August 27, 2014
Time: 11:00-12:00 PM EDT
Registration Link: https://www1.gotomeeting.com/register/316333680
We hope to see all interested parties there!
Finding Who Has Admin Rights on Desktops and Servers
Local Administrator groups are created on every desktop and server when they are initially built, providing complete access at the system level to perform various administrative tasks. In most organizations, it’s not uncommon to find that there are no facilities or processes in place to centrally maintain or monitor who belongs to these groups, who’s being added and removed, and what members are actually doing with these access privileges.
Modified on by 1V3R_Charlie_Palella
Please view our 2 minute video that depicts how and why you need STEALTHbits to gain visibility into unstructured data (SharePoint and File Shares) and improve the value of your ISIM identity and access management solution.
Extending the value of your QRadar investment with monitoring of AD and file system activity
By utilizing StealthINTERCEPT®, the Windows Event Monitor for QRadar provides the ability to feed concise detail regarding file system access and Active Directory modifications to QRadar in real time. By distilling change and access activities into individual, complete, self-contained access events, this integration efficiently collects and delivers critical activity information for easy consumption and correlation by QRadar. These events are often impractical to collect and make sense of using standard Windows EventLog technology, as they can be extremely disjointed and in some cases incomplete. Additionally, high volume EventLog traffic historically introduces unacceptable overhead to servers that are configured to collect everything. The StealthINTERCEPT (SI) event collection approach brings to bear deep introspection that has been specifically geared for completeness and efficiency for the specific event types that it collects.
By extending monitoring visibility for applications and data for access configuration changes, and file system contents and permissions access, the StealthINTERCEPT® integration provides real savings in terms of identifying and mitigating unauthorized or potentially risky activities in the environment. These savings are realized through expediting awareness (early detection and detailed reporting) of potentially costly issues of inadvertent or malicious changes in access rights (based on groups), global configuration (in the form of GPOs) or access to sensitive data. By identifying and alerting on these situations, appropriate remediation steps can be taken as soon as possible to prevent or mitigate resultant security fallout or interruption of service to critical applications. This information can also be correlated with network access activity data from QRADAR to further pinpoint the source of malicious activities for a more definitive picture of exposures and remediation options.
In addition, this integration facilitates the visualization of Active Directory and file system usage patterns, enabling the formulation of steps to minimize costs that could be incurred when these repositories are moved, migrated, or otherwise caused to become unavailable to critical applications or individuals that rely on them.
Modified on by 1V3R_Charlie_Palella
The Ready for IBM Security Intelligence Program
fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. Join the Webinar to learn how the newly validated solution, Data Governance for ISIM,
from STEALTHbits Technologies
enables IBM Security Identity Manager to provision and de-provision access to unstructured data (SharePoint, File Systems, SQL, etc). Data Governance for ISIM delivers the same automated access control of this unstructured data to ISIM, that you have come to know for application provisioning. Join IBM and STEALTHbits for an interactive webinar to learn about how organizations can achieve unmatched visibility and governance of unstructured data.
View this webinar on demand at:
Originally recorded on Thursday, June 20, 2013
Listen to Jose Bravo, IBM's North American Security Architect discuss ways to secure and protect key systems and assets.
Modified on by 1V3R_Charlie_Palella
STEALTHbits entered the App Throwdown during the 2014 Pulse Conference and was chosen as a top 5 finalist out of 27 submissions. Watch the video on Youtube: https://www.youtube.com/watch?v=j6GBdZv2yIc&feature=youtu.be
Modified on by 1V3R_Charlie_Palella
Join Ellen Knickle, QRadar Sr. Product Manager and Brad Sutton, STEALTHbits Technical Product Manager to hear more about QRadar and how STEALTHbits adds another layer of security by monitoring Windows events, identifying potential insider or outsider threats to AD, file systems, NAS and Exchange environments.
Call Title: Giving ISIM the Competitive Advantage: Compete against and defeat the other IAM vendors
Abstract: Organizations face more complexity than ever in ensuring users have appropriate resource access while maintaining compliance and minimizing security risks. Aside from the burden of identity management, administrators must also address the growing problem of Unstructured Data (user-generated data), which, on average, represents nearly 80% of all information in an organization. To make matters worse, it’s estimated that 30-40% of all organization’s Unstructured Data contains sensitive content in the form of Personally Identifiable Information or Intellectual Property.
Identity and Access Management (IAM) vendors predominantly manage access and governance to critical applications, databases, and directory services. This access governance does not extend into the massive amounts of data contained in File Shares or SharePoint sites, making it blind to the entitlements being granted to unstructured data resources.
Join this webinar to discover how leveraging StealthAUDIT for ISIM can:
· Eliminate unstructured data blind spots
· Automate access governance over unstructured data
· Increase the value of your ISIM deployment, extending its coverage to Microsoft-based file assets
· Allow you to gain the competitive edge to win more deals against other IAM vendors
Speakers: Ravi Srinivasan, Director IAM, Cloud Security PM, IBM
Jonathan Sander, Strategy & Research Officer, STEALTHbits
Date: Tuesday, May 20, 2014
Time: 11:00 a.m. to Noon U.S. Eastern time
US Toll Free Dial In: 866-803-2143
US Toll Dial In: 1-210-795-1098
Webcast URL: For IBMers: https://w3.ibm.com/collaboration/meeting/unyte.nsf/join?OpenForm&?schedid=6081872
For Business Partners: https://www.ibm.com/collaboration/meeting/join?schedid=6081872
HAWTHORNE, NJ and ROME, ITALY , JULY 2, 2014 – STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today a new partnership with the Italian-based Identity & Access Governance solution provider CrossIdeas. The integration of STEALTHbits’ Data Access Governance solutions with CrossIdeas’ IDEAS Identity & Access Governance platform enables CrossIdeas customers to extend the benefits of user access lifecycle management to the unstructured, human-generated data primarily residing in data repositories such as File Systems and SharePoint.
Read the full press release:
Cool Vendors in Security: Identity and Access Management, 2013
Gartner Article Number: ID:G00247950
Earl Perkins, Gartner Analyst said, "STEALTHbits brings unstructured data access governance to IAM for
Windows infrastructure. While IAG solutions focus on governing access to applications,
STEALTHbits has features that create an environment for collecting, analyzing and
reporting on unstructured data environments."
The latest release of StealthINTERCEPT for QRadar has been validated as Ready for IBM Security Intelligence. Now you can monitor activity of Active Directory, File Systems and Exchange in real-time, and receive alerts of suspicious activity in your QRadar console ... all without the need for native logging. Monitor insider activities and improve the security profile by correlating with network activity already being watched ... adding a whole new context to security intelligence.
Watch this 2 minute video to see 3 example scenarios: