HAWTHORNE, NJ--December 6th, 2018, - STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced significant enhancements to its flagship product with the release of StealthAUDIT v8.2.
An important component of StealthAUDIT and the Data Access Governance capabilities it provides is the ability to discover and classify over 400 different file types within a myriad of unstructured data repositories. In StealthAUDIT v8.2, Nasuni UniFS, NFS-formatted file systems across Unix, Linux, and NAS platforms, Dropbox Business, and Microsoft Office 365 Exchange Online are now also supported, extending an already broad array of supported platforms.
In addition to extending Sensitive Data Discovery capabilities and platform support for performing Data Classification in this release, STEALTHbits has also included 51 new GDPR-specific pattern definitions, spanning all EU countries and more.
“The audit results we’re seeing confirm what many suspected, but few wanted the reality to be. Sensitive data is being stored everywhere – on-premises and in the cloud. The ability to locate sensitive data wherever it lives is a really important feature for enterprises preparing for GDPR audits and the like,” said Adam Laub, SVP Product Marketing. “With full coverage across the Office 365 suite - SharePoint Online, OneDrive for Business, and Exchange Online – as well as alternative platforms like Dropbox and Nasuni Hybrid NAS, customers will be able to see what their users are storing and what access they have across on-prem and cloud resources, all from a single pane of glass.”
StealthAUDIT 8.2 is available immediately. To learn more, we invite you to register for our upcoming webinar. Or, to arrange a private demonstration, please contact us at firstname.lastname@example.org.
About STEALTHbits Technologies
STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
For more information, visit http://www.stealthbits.com