STEALTHbits, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announces its newest product line, STEALTHbits Privileged Activity Manager (SbPAM).
STEALTHbits uniquely fills critical gaps in Identity and Access Management (IAM) programs by extending visibility into data sources these solutions cannot connect to, or at levels they are not designed to provide.
STEALTHbits’ solutions discover these missing data access entitlements and privileged accounts with ease, extending and bolstering IAM’s control over the two things every attacker is after: credentials and data.
SbPAM is a next generation Privileged Access Management solution that seeks to not just control privileged accounts, but effectively reduce the quantity of them altogether using a variety of modern techniques, such as the use of ephemeral accounts and a just-in-time (JIT), just-enough privilege (JEP) approach to privileged access.
Rather than solely checking out credentials from a vault, SbPAM can elevate the access level of a standard account or create the account at the exact time it is needed to allow the completion of an admin task, then removes those privileges once the task is complete.
This zero standing privilege (ZSP) approach means that organizations can reduce risk of account compromise and increase overall security.
“STEALTHbits extends our customers’ IAM platforms into 80 percent of data that they don’t have visibility into today – namely unstructured data – allowing them to provision, deprovision and govern access to all data from a single platform,” explained Adam Laub, CMO at STEALTHbits.
“To facilitate faster and healthier IAM implementations, we clean and secure Active Directory, which is the primary identity store for 90 percent of organizations worldwide,” he continued.
“And this year, I am very excited to introduce the Gartner attendees to our newest product line, STEALTHbits Privileged Activity Manager (SbPAM), which embraces a zero standing privilege (ZSP) architecture for Privileged Access Management.”