Hawthorne, N.J., January 14, 2019

Stealthbits Products, Now Part of Netwrix, Added To Department of Homeland Securitys Continuous Diagnostics and Mitigation Approved Products List

Inclusion in the Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) approved products

Stealthbits, now part of Netwrix, a cybersecurity vendor that makes data security easy, today announced its inclusion in the Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) approved products list.

The Continuous Diagnostics and Mitigation (CDM) Program is a dynamic approach to fortifying the cybersecurity of government networks and systems. The CDM Program provides DHS, along with Federal Agencies, with capabilities and tools to identify cybersecurity risks on an ongoing basis, prioritize these risks based for potential impact, and enable cybersecurity personnel to mitigate the most significant problems first.

The hardware and software products and associated services under this category undergo a DHS product qualification process in order to be added to the CDM Approved Products List (APL).

Stealthbits enables agencies to secure their most sensitive data and the credentials that provide access to that data, resulting in the most comprehensive Data Access Governance and Active Directory Management & Security portfolio in the industry.

Agencies don’t have adequate resources to understand or address all the different threats they face and continue to struggle with foundation-level security best practices. The volume of events produced by native logging is overwhelming, which makes data difficult to consume, and it often takes several months for organizations to detect a breach.
Pat Park, VP of Federal Sales at Stealthbits, now part of Netwrix

Stealthbits maps to each of the four phases of the CDM. Stealthbits has the capabilities to enrich existing solutions for Identity Management and Privileged Account Management. Stealthbits maps to each of the phases in the following ways:

  • Phase 1 of CDM, “What is on the network?” Stealthbits augments inventory capabilities with discovery and mapping of data-related entities including shared file systems and directory service objects, highlighting at-risk and stale data, misconfigurations and other concerns.
  • Phase 2 of CDM, “Who is on the network?” Stealthbits augments identify efforts by enumerating account and group objects in multiple directory services (AD, LDAP, NIS) as well as local user and group objects, and maps functional access of these account objects by analyzing group membership and all file and email system directory permissions, including inherited access through parent directory and group relationships.
  • Phase 3 of CDM, “What is happening on the network?” Stealthbits’ Threat Analytics capabilities does more than analyze user behavior and provide pretty dashboards. It’s about proactively understanding the threats against your various assets, pin-pointing the vulnerabilities that those threats exploit, and employing detection, protection, and mitigation controls to neutralize those threats and reduce risk.
  • Phase 4 of CDM, "How is data protected?" Stealthbits helps meet requirements by both enhancing detection capabilities and reducing risk surface area with respect to data accessibility, allowing organizations to control the risk every file poses. These files can contain anything from regulated data to trade secrets, including the data you thought was locked up tight in databases and applications. Knowing the risk any file can pose your organization is an absolute necessity in understanding who has access to it and what they are doing with that access.

“Our technology has proven to provide value in multiple ways, as it helps government agencies reduce risk, increase security, save time, save money, and achieve compliance with a myriad of standards. Stealthbits protects data and credentials on-premises and in the cloud to ensure a state of security for your agency, users, data, and constituents,” said Park.

about netwrix corporation

Netwrix makes data security easy thereby simplifying how professionals can control sensitive, regulated and business-critical data, regardless of where it resides. More than 11,500 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.

Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

For more information, visit www.netwrix.com.

contact us

Your questions and feedback are always welcome. Please dial our toll-free number: 888 - 638 - 9749, or enter your question details here and we will reply as soon as possible.

Media contact

Erin Jones, Avista PR for Netwrix
Phone: 704 - 664 - 2170

Follow us