StealthAUDIT Expands to Structured Data and more with StealthAUDIT v8.1

STEALTHbits Technologies, Inc © 2018
Identify Threats. Secure Data. Reduce Risk.
STEALTHbits Logo

Adam Laub, STEALTHbits SVP of Product Marketing, will walk through the enhancements to our flagship product StealthAUDIT. In version 8.1, STEALTHbits becomes the first Data Access Governance solution provider to support both unstructured and structured data repositories.

In this webinar, Adam covers:


  • SQL Platform Support – StealthAUDIT’s Data Access Governance suite now provides support for Microsoft SQL databases (permissions auditing, sensitive data discovery, activity monitoring, and more)
  • Weak Password Detection – StealthAUDIT will automatically compare the password hashes of your users against password hashes found in attacker dictionaries to help you identify and eliminate weak passwords in your organization
  • AD and Windows Threat Reporting – Out-of-the-box reporting on Active Directory and Windows threats has been expanded in v8.1, broadening StealthAUDIT’s visibility into conditions and misconfigurations attackers exploit in the real-world to compromise your credentials and data

StealthAUDIT v8.1 also contains many other updates, including; RBAC controls for StealthAUDIT Published Reports, sensitive data discovery support for Exchange, upgrade improvements, SharePoint 2016 support, and more!

View the Webinar!

STEALTHbits Technologies Webinar StealthAUDIT Expands to Structured Data and more with StealthAUDIT v8.1