Tuesday, September 16, 2014 Last update: 4:03 AM
FreshNews.com - All Company Technology News Since 1996

STEALTHbits Launches Version 2.2 of StealthSEEK(R) Sensitive Data Discovery Solution

Companies mentioned in this article: STEALTHbits Technologies

HAWTHORNE, NJ -- (Marketwired) -- 06/16/14 -- STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today that version 2.2 of their sensitive data discovery solution, StealthSEEK, has been released.

Data breach events are on the rise and the focus is on sensitive data. While many organizations have tight controls and substantial security around their critical applications, most have no understanding of where critical and sensitive data such as credit card numbers, social security numbers, passwords, and usernames, lives outside of their application databases.

StealthSEEK provides powerful and granular sensitive data discovery for unstructured data residing on file systems across desktop, server, and NAS infrastructure, providing organizations the answers to critical questions: where is my sensitive data? who has access to it? and how do I remediate it?

With the growing popularity of Mac, scanning for sensitive data on only Windows File Systems is no longer an option. Version 2.2 allows organizations to scan Mac systems for sensitive content, increasing the value StealthSEEK brings to the business.

"StealthSEEK has seen tremendous growth since its inception in 2012." said Kevin Foisy, Chief Software Architect for STEALTHbits. "With new support for Apple OS, scanning Mac is now as easy as scanning a Windows box. Additionally, users that want to enhance their scans to an enterprise scale can develop and test scan criteria with SEEK and with one click, feed that into the STEALTHbits Data Access Governance engine for high volume scanning. This gives customers the simplicity they want coupled with enterprise class scanning and remediation workflows."

Additional 2.2 features and enhancements include:

  • Ad-hoc scheduling of scans
  • Faster scanning -- a new option to scan only content that has changed since a specific date
  • Ability to remove files permanently from the file system using secure delete
  • DFS support
  • Integration with STEALTHbits' flagship product, StealthAUDIT, for enterprise-class, complete Data Access Governance -- sensitive data discovery, effective access reporting, entitlement reviews, and attestation.

StealthSEEK v2.2 is available worldwide June 16, 2014. Pricing starts at $10 per User. Enterprise licensing is also available.

ADDITIONAL RESOURCES
For more information about StealthSEEK, visit http://www.stealthbits.com/products/stealthseek

For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance

ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.

Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.


Contact:

Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
dchm@madisonalexanderpr.com