AP NEWS
Press release content from Business Wire. The AP news staff was not involved in its creation.
PRESS RELEASE: Paid content from Business Wire
Press release content from Business Wire. The AP news staff was not involved in its creation.

STEALTHbits Offers New Capabilities to Strengthen Enterprise Passwords and Harden Active Directory Security in StealthINTERCEPT 7.0

January 14, 2020 GMT

HAWTHORNE, N.J.--(BUSINESS WIRE)--Jan 14, 2020--

STEALTHbits Technologies, Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal it, today announced the release of StealthINTERCEPT 7.0, their real-time Active Directory (AD) policy enforcement solution that audits and blocks unwanted and unauthorized changes, authentications, and queries within the world’s largest and most complex AD infrastructures.

With 95 million AD accounts attacked daily 1 and 56% of breaches taking a month or longer to discover 2, attackers still have the upper the hand on security. While many organizations do some general monitoring, auditing, and threat detection, it’s not enough to slow down the number of cyber-attacks, which increased 54% in the first half of 2019 3.

The latest enhancements delivered in StealthINTERCEPT 7.0 aim to provide organizations advanced capabilities to thwart attacks against AD and provide progressive password policy and complexity improvements that boost security without causing poor user and administrator experiences.

Among dozens of significant enhancements, StealthINTERCEPT 7.0 can now detect successful and failed Kerberos pre-authentication events in order to provide administrators and security analysts visibility into nefarious activities like password spraying attempts using tools like Kerbrute early in the attack kill chain. This release also allows users to audit and block AD User Account Control (UAC) and DNS configuration changes, as well as detect and block LDAP queries attempting to identify where sensitive data resides and the best attack path to it (e.g. attackers leveraging tools like Bloodhound).

While passwords can be a significant source of irritation for end-users and administrators alike, they still play a critical role in organizational defenses and workplace experiences. StealthINTERCEPT 7.0 contains a number of significant enhancements focused on strengthening account passwords, headlined by the ability to compare user passwords against the “Have I Been Pwned” database of 550+ million known breached passwords and prevent them from being used at their time of creation.

This release also allows administrators to more granularly control password requirements to ensure compatibility with all resources and provide users clear definition of password policies and rejected password feedback during the password change process.

To further improve passwords and keep attackers from guessing common substitutions, organizations can now control which character replacements are allowed and which are not (e.g. $=S or @=A). To facilitate smooth operations, customers can now test new password policies prior to rollout and evaluate any potential impacts they would cause if established.

“As is the goal with every release of StealthINTERCEPT, the enhancements in v7.0 are aimed at providing easy to use capabilities to improve organizational defenses without burdening users or administrators,” stated Rod Simmons, Vice President of Product Strategy, STEALTHbits Technologies. “We’ve all been hearing for years about alert fatigue and a lack of resources in the cybersecurity space. One of the most beautiful things about StealthINTERCEPT is its ability to help security and even operational teams move beyond the never-ending deluge of alerts and actually prevent attackers, malicious insiders, and even well-intentioned administrators from violating security policy and operational policies in the first place.”

ABOUT STEALTHBITS TECHNOLOGIES

STEALTHbits Technologies is a customer-driven cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

Identify threats. Secure data. Reduce risk.

For more information, visit http://www.stealthbits.com/contact or call +1-201-447-9300.

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

1https://www.zdnet.com/article/active-directory-czar-rallies-industry-for-better-security-identity/
2https://enterprise.verizon.com/resources/reports/dbir/2019/summary-of-findings/
3https://www.techrepublic.com/article/data-breaches-increased-54-in-2019-so-far/

View source version on businesswire.com:https://www.businesswire.com/news/home/20200114005134/en/

CONTACT: Dan Chmielewski

Madison Alexander PR

Office: +1 714-832-8716

Mobile: +1 949-231-2965

dchm@madisonalexanderpr.com

KEYWORD: NEW JERSEY UNITED STATES NORTH AMERICA

INDUSTRY KEYWORD: DATA MANAGEMENT SECURITY TECHNOLOGY SOFTWARE NETWORKS INTERNET

SOURCE: STEALTHbits Technologies, Inc.

Copyright Business Wire 2020.

PUB: 01/14/2020 06:00 AM/DISC: 01/14/2020 06:00 AM

http://www.businesswire.com/news/home/20200114005134/en