Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
HAWTHORNE, NJ -- (Marketwired) -- 06/04/14 -- STEALTHbits Technologies Inc., leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today the launch of a new File Sync and Share (FSS) Application discovery solution, designed to identify where any of the premier consumer cloud storage applications are running across an organization's desktop and server infrastructure. The solution is being offered as a free trial and aims to help IT departments proactively identify where FSS applications exists as a first step in mitigating the risks they face with concern to File Sync & Share usage.
"Despite being extremely useful in a consumer's personal life, the adoption of FSS applications for business-use means that sensitive business information is being left exposed," said Jonathan Sander, Strategy & Research Officer for STEALTHbits. "In the event that an employee's cloud storage application account is compromised, all of its contents are instantly made accessible with no possible recourse."
"The first step in addressing this security concern is to identify where these cloud storage applications are running within your environment. The File Sync and Share Assessment in StealthAUDIT does exactly this," said Alex Berger, Product Manager of Active Directory and Systems Governance Solutions for STEALTHbits. "Certainly there are multiple vectors involved when talking about File Sync and Share security as a whole, but rather than playing a game of 'Where's Waldo?' with the FSS apps being used within an organization, we wanted to make it easy for everyone to pinpoint where their attention is needed."
The StealthAUDIT File Sync and Share Discovery Assessment will identify instances of the following cloud storage applications in use, in addition to the host and user running them:
The assessment is free and available for immediate download from STEALTHbits' website - http://www.stealthbits.com/solutions/file-sync-share-discovery-solution-download
For more information, visit http://www.stealthbits.com, email sales@stealthbits.com, call +1-201-447-9300, or follow STEALTHbits on Twitter (http://www.twitter.com/STEALTHbits)
ADDITIONAL RESOURCES
For more information on STEALTHbits' File, Sync, and Share Application Discovery Solution, visit http://www.stealthbits.com/solutions/file-sync-and-share-discovery-solution
For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance
ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.
Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
dchm@madisonalexanderpr.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs