Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

New Stealthbits Identity-Centric Data Privacy Engine Simplifies and Speeds Compliance with Growing Privacy Regulations

StealthAUDIT Enhancement Delivers Results to Data Subject Access Requests in Seconds

Stealthbits, a cybersecurity software leader that protects sensitive data and credentials from attackers, unveiled its new Data Privacy Engine that connects user identities with the locations of their personal data to elevate data access governance. This enables organizations worldwide to deal with Data Subject Access Requests (DSARs) efficiently and effectively, mitigating the risk of substantive fines under worldwide privacy laws.

“Privacy legislation, including the General Data Protection Regulation (GDPR), demands fast and efficient response to DSARs,” said Adam Rosen, vice president, product strategy, Stealthbits. “Our new Data Privacy Engine is the first solution to proactively understand how data is connected to identities, enabling near-instantaneous answers to DSARs. This means our customers can address both data security and data privacy simultaneously, which we believe are two sides of the same coin.”

Now available, the new Data Privacy Engine works with the company’s StealthAUDIT reporting and governance solution to dramatically streamline and speed data analysis and governance reporting.

Recommended AI News: Voyager Digital Announces Listing of the Terra (LUNA) Token

A Different Approach – Look Beyond the Data

Related Posts
1 of 21,933

Stealthbits takes a multi-layered approach that looks beyond the data layer to examine all the different ways data can be accessed, including via Active Directory, elevated privileges, the data resource itself or a combination of permissions and misconfigurations. By automatically examining data, directory and system layers of hybrid IT infrastructures, organizations can rapidly detect and remove hidden vulnerabilities while ensuring appropriate access governance.

“Some data access governance solutions focus only on the data itself, leaving open ‘backdoor access’ to potential threats,” said Fran Howarth, practice leader, Security, Bloor Research. “Stealthbits’ approach, however, also accounts for risks from elevated credentials that can be exploited to access governed data by other means.”

Recommended AI News: CES 2021 BayPay Rides Rise in Token Commerce with Its Simple, Fast, and Safe Payment Service

This multi-layered approach is crucial to determining whether an organization has taken all the necessary steps to protect their data, credentials and systems adequately. All it takes for someone to take advantage of a security incident is some lateral movement and standing privileges. According to a study published last week by Netwrix, more than half of organizations that store customer data in the cloud had security incidents in 2020. Stealthbits adds an extra safeguard to reduce the reach and severity of security incidents while preventing minor exposures from becoming serious data breaches.

Stealthbits’ solutions ensure compliance with data privacy regulations by reducing security risk exposure levels through pre-discovery of data subjects across all repositories—structured, unstructured, on-premises or in the cloud. Stealthbits then takes an identity-centric view into this subject data, identifying which files and tables relate to certain people to provide appropriate context and drive better decisions about data access, recovery and other actions.

Recommended AI News: Driverge Vehicle Innovations Acquires NorCal Van Conversions Adding West Coast Manufacturing and Distribution Capabilities

Leave A Reply

Your email address will not be published.