HAWTHORNE, NJ--December 10th, 2018, - STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced its inclusion in the Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) approved products list.
The Continuous Diagnostics and Mitigation (CDM) Program is a dynamic approach to fortifying the cybersecurity of government networks and systems. The CDM Program provides DHS, along with Federal Agencies, with capabilities and tools to identify cybersecurity risks on an ongoing basis, prioritize these risks based for potential impact, and enable cybersecurity personnel to mitigate the most significant problems first.
The hardware and software products and associated services under this category undergo a DHS product qualification process in order to be added to the CDM Approved Products List (APL).
STEALTHbits enables agencies to secure their most sensitive data and the credentials that provide access to that data, resulting in the most comprehensive Data Access Governance and Active Directory Management & Security portfolio in the industry.
“Agencies don’t have adequate resources to understand or address all the different threats they face and continue to struggle with foundation-level security best practices,” said Pat Park, VP of Federal Sales at STEALTHbits Technologies.
Park continued, “The volume of events produced by native logging is overwhelming, which makes data difficult to consume, and it often takes several months for organizations to detect a breach.”
STEALTHbits Technologies maps to each of the four phases of the CDM. STEALTHbits has the capabilities to enrich existing solutions for Identity Management and Privileged Account Management. STEALTHbits maps to each of the phases in the following ways:
Phase 1 of CDM, “What is on the network?” STEALTHbits augments inventory capabilities with discovery and mapping of data-related entities including shared file systems and directory service objects, highlighting at-risk and stale data, misconfigurations and other concerns.
Phase 2 of CDM, “Who is on the network?” STEALTHbits augments identify efforts by enumerating account and group objects in multiple directory services (AD, LDAP, NIS) as well as local user and group objects, and maps functional access of these account objects by analyzing group membership and all file and email system directory permissions, including inherited access through parent directory and group relationships.
Phase 3 of CDM, “What is happening on the network?” STEALTHbits’ Threat Analytics capabilities does more than analyze user behavior and provide pretty dashboards. It’s about proactively understanding the threats against your various assets, pin-pointing the vulnerabilities that those threats exploit, and employing detection, protection, and mitigation controls to neutralize those threats and reduce risk.
Phase 4 of CDM, "How is data protected?" STEALTHbits helps meet requirements by both enhancing detection capabilities and reducing risk surface area with respect to data accessibility, allowing organizations to control the risk every file poses. These files can contain anything from regulated data to trade secrets, including the data you thought was locked up tight in databases and applications. Knowing the risk any file can pose your organization is an absolute necessity in understanding who has access to it and what they are doing with that access.
“Our technology has proven to provide value in multiple ways, as it helps government agencies reduce risk, increase security, save time, save money, and achieve compliance with a myriad of standards. STEALTHbits protects data and credentials on-premises and in the cloud to ensure a state of security for your agency, users, data, and constituents,” said Park.
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
For more information, visit http://www.stealthbits.com