Hawthorne, N.J., November 12, 2019

Stealthbits, Now Part of Netwrix, Offers a Practical Approach to Managing Privileged Access with Stealthbits Privileged Activity Manager (SbPAM) Version 1.3

The release of Stealthbits Privileged Activity Manager (SbPAM) 1.3 is announced today

Stealthbits, now part of Netwrix, today announced the release of Stealthbits Privileged Activity Manager (SbPAM) 1.3, their just-in-time (JIT), just-enough privilege, task-based Privileged Access Management platform.

Privileged accounts will always appeal to cyber attackers because of the access rights associated with these accounts. Despite significant investments in Privileged Access Management (PAM) technologies however, privileged accounts are still massively overexposed in most organizations. Traditional PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform while using the account. Worse, the traditional PAM paradigm still leaves many privileged accounts at risk of compromise as the accounts maintain persistent access (commonly referred to as “Standing Privileges”) to the resources they’re assigned to. Savvy attackers are able to exploit this condition with relative ease.

Among dozens of enhancements, SbPAM 1.3 provides unique ephemeral (temporary or momentary) accounts to be created at the time a privileged activity needs to take place, but automatically disabled and stripped of permissions when not in use. This approach ensures no standing privileges remain with accounts, removing them as viable attack targets. Additionally, new multi-tier approval workflows ensure managers and business owners are not only aware of administrative activities, but are able to actively approve or deny session requests.

No accounts have privileges associated with them on a permanent (i.e., static) basis, and no admin has unfettered access to any systems. This reduces a company's attack surface significantly since hackers have taken to stealing the credentials of such privileged users, precisely because that has traditionally meant they could access all areas within a victim's infrastructure.
Rik Turner, principal analyst, Ovum, report Stealthbits adds PAM with the option to "Bring Your Own Vault”

With many products that govern access via policy, lack of granular access often forces a need to create many policies to support edge cases. SbPAM 1.3 saves time and effort with connection profiles that allow reusable configurations to be applied to many access policies. Connection profile changes are applied globally and automatically, in addition to including granular session parameters such as maximum time, proxy settings, and approval workflows.

Regardless of whether organizations are looking to improve administrator accountability or need evidence during an incident investigation, SbPAM 1.3 provides the ability to record and playback sessions for definitive proof of what actually transpired during a particular session.

Stealthbits has spent years developing a next generation PAM solution. Instead of focusing on privileged account management, we fix the problem at the source by eliminating the vast majority of privileged accounts and removing administrative rights when not in active use. SbPAM 1.3 is the next step in the evolution of our zero standing privileges (ZSP) approach to PAM. Ephemeral accounts, approval workflows, connection profiles, and session recordings are all aimed at protecting privileged access without causing an administrative burden.
Martin Cannard, VP of Product Strategy at Stealthbits, now part of Netwrix

about netwrix corporation

Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

For more information, visit www.netwrix.com.

contact us

Your questions and feedback are always welcome. Please dial our toll-free number: 888 - 638 - 9749, or enter your question details here and we will reply as soon as possible.

Media contact

Erin Jones, Avista PR for Netwrix
Phone: 704 - 664 - 2170

Follow us