Steve Cochran, Founder & CEOToday, security conscious organizations deploy cutting-edge mechanisms to monitor data access and block unauthorized attempts. Usually, active directory holds the key to IT infrastructure and serves as authentication and authorization point in most of the organizations. Cyber attackers relentlessly endeavor to explore gateways to active directory in their bid to hold the companies to ransom. The grim scenario solicits robust security mechanism to defend IT infrastructure and RSA solution emerges as the most suitable one. Hawthorne, NJ based STEALTHbits Technologies leverages the power of RSA solutions and enables clients to operate in a secured environment with sheer visibility into IT infrastructure and processes.
STEALTHbits acknowledges the poor visibility and control over IT activities as the root causes of security and operational risks that are related to most organizations. “The access model is broken, the scale is monumental, and the threats are largely unknown,” states Steve Cochran, Founder and CEO of STEALTHbits Technologies. The company endues the clients with its solution-StealthINTERCEPT to perform auditing of access in real time. The product intercepts and inspects complete Active Directory (AD), exchanges, and file system traffic at the source. StealthINTERCEPT detects AD and group policy object modification, creations, deletions, and moves and examines file system access, permissions, and mailbox access by non-owners. STEALTHbits’s cutting-edge security solution identifies authentication based attacks like brute force, account hacks, and lateral movement. The company is aware of the risk factors associated with crypto ransomware, file exfiltration, and privilege account use and abuse. StealthINTERCEPT detects advanced threats through its authentication and file analytics capabilities in its endeavor to mitigate the risk raised by the said threats.
The capabilities allow the client to zero in on malware propagation, and passive as well as active intruders in their networks. StealthINTERCEPT alerts on changes and threats immediately after their detection and expedites the process of threat response. Eventually, the clients succeed to avoid loss of crucial data. The product provides integration with RSA Security Analytics-a foundation of RSA Advanced SOC solution.
StealthINTERCEPT’s philosophy is a departure from traditional security approaches
StealthINTERCEPT not only transmits the data but also shares the incidences with the security information and event management (SIEM) solution. Subsequently, it reduces the SIEM payload and delivers the actionable insights in real-time.
StealthINTERCEPT simplifies the process of analyzing the changes in domain controller and endues the clients with insight about its migration, updation, consolidation, or decommission. The authentication analysis also assists companies to comprehend the impact after the alterations.
The extensive features of products like StealthINTERCEPT and STEALTHbits’s expertise in AD have been key elements in numerous success stories crafted by the company. In one of the instances, a rapidly growing healthcare services company had to overcome the challenge of active directory integration. As the company’s growth was being fueled by acquisitions, active directory integration was an inevitable task. The client’s IT team had to integrate new organizations and subsequently AD cleanup and optimization were sidetracked. The healthcare services company had different sets of policies, with dozens of groups with different names, 4000 users, and 150 admin accounts. STEALTHbits collaborated with the client, analyzed AD data using the AD assessment tool, and created an AD optimization strategy. Eventually, the client could develop AD cleanup document with detailed project priorities.
As the security exploits and threats grow exponentially with the passage of time, the situation proffers a great opportunity to STEALTHbits in terms of business expansion and product development. The company looks forward to empower its clients with advanced capabilities in addressing the security challenges and operating within the confines of safer IT environment.