STEALTHbits Helps Thwart Critical Elements Of Credential Theft Attacks With The Latest Release Of StealthINTERCEPT

Monitor and Prevent Threats in Real-Time

 STEALTHbits Technologies Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, has announced the release of StealthINTERCEPT 5.0.

StealthINTERCEPT provides organizations with the operational and security intelligence necessary to achieve a clean, properly configured, closely monitored, and tightly controlled Active Directory environment.

“Organizations are realizing the risk associated with having over provisioned users and groups within Active Directory. They are looking for ways to automate the monitoring process and apply security controls that enforce best practices. STEALTHbits has approached solving this problem from the eyes of our customers,” said Gabriel Gumbs, STEALTHbits VP of Product Strategy.

The StealthINTERCEPT 5.0 offering builds on this foundation to help thwart critical elements of credential theft attacks by limiting exposure of privileged credentials across multiple threat vectors. From the StealthINTERCEPT LSASS Guardian which protects against memory injection attacks to DCSync protection and enforcement of ESAE Administrative Forest Designs, StealthINTERCEPT 5.0 combines cutting-edge enhancements and enforcement of recommended practices to elevate Active Directory security.

StealthINTERCEPT 5.0 also contains many other updates, including Enterprise Password Enforcement, which proactively prevents the usage of weak and compromised passwords from being used – regardless of whether or not they meet complexity requirements – further enforcing password hygiene and reducing the opportunity for attackers to crack or guess passwords with automated or manual techniques.

StealthINTERCEPT 5.0 is available immediately. To learn more, register for the Feb. 13 webinar. To arrange a private demonstration, contact sales@stealthbits.com.

Subscribe
Notify of
guest

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x