Stealthbits Products, Now Part of Netwrix, Added To Department of Homeland Securitys Continuous Diagnostics and Mitigation Approved Products List
Stealthbits, now part of Netwrix, a cybersecurity vendor that makes data security easy, today announced its inclusion in the Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) approved products list.
The Continuous Diagnostics and Mitigation (CDM) Program is a dynamic approach to fortifying the cybersecurity of government networks and systems. The CDM Program provides DHS, along with Federal Agencies, with capabilities and tools to identify cybersecurity risks on an ongoing basis, prioritize these risks based for potential impact, and enable cybersecurity personnel to mitigate the most significant problems first.
The hardware and software products and associated services under this category undergo a DHS product qualification process in order to be added to the CDM Approved Products List (APL).
Stealthbits enables agencies to secure their most sensitive data and the credentials that provide access to that data, resulting in the most comprehensive Data Access Governance and Active Directory Management & Security portfolio in the industry.
Agencies don’t have adequate resources to understand or address all the different threats they face and continue to struggle with foundation-level security best practices. The volume of events produced by native logging is overwhelming, which makes data difficult to consume, and it often takes several months for organizations to detect a breach.Pat Park, VP of Federal Sales at Stealthbits, now part of Netwrix
Stealthbits maps to each of the four phases of the CDM. Stealthbits has the capabilities to enrich existing solutions for Identity Management and Privileged Account Management. Stealthbits maps to each of the phases in the following ways:
- Phase 1 of CDM, “What is on the network?” Stealthbits augments inventory capabilities with discovery and mapping of data-related entities including shared file systems and directory service objects, highlighting at-risk and stale data, misconfigurations and other concerns.
- Phase 2 of CDM, “Who is on the network?” Stealthbits augments identify efforts by enumerating account and group objects in multiple directory services (AD, LDAP, NIS) as well as local user and group objects, and maps functional access of these account objects by analyzing group membership and all file and email system directory permissions, including inherited access through parent directory and group relationships.
- Phase 3 of CDM, “What is happening on the network?” Stealthbits’ Threat Analytics capabilities does more than analyze user behavior and provide pretty dashboards. It’s about proactively understanding the threats against your various assets, pin-pointing the vulnerabilities that those threats exploit, and employing detection, protection, and mitigation controls to neutralize those threats and reduce risk.
- Phase 4 of CDM, "How is data protected?" Stealthbits helps meet requirements by both enhancing detection capabilities and reducing risk surface area with respect to data accessibility, allowing organizations to control the risk every file poses. These files can contain anything from regulated data to trade secrets, including the data you thought was locked up tight in databases and applications. Knowing the risk any file can pose your organization is an absolute necessity in understanding who has access to it and what they are doing with that access.
“Our technology has proven to provide value in multiple ways, as it helps government agencies reduce risk, increase security, save time, save money, and achieve compliance with a myriad of standards. Stealthbits protects data and credentials on-premises and in the cloud to ensure a state of security for your agency, users, data, and constituents,” said Park.
Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.
For more information, visit www.netwrix.com.
Your questions and feedback are always welcome. Please dial our toll-free number: 888 - 638 - 9749, or enter your question details here and we will reply as soon as possible.
Erin Jones, Avista PR for Netwrix
Phone: 704 - 664 - 2170