Intelligent Data Centres Issue 20 | Page 15

LATEST INTELLIGENCE

CREDENTIAL AND DATA SECURITY ASSESSMENT

SStealthbits ’ Credential and Data Security Assessment ( CDSA )

Regardless of an attacker ’ s entry point into an organization , they ’ re always after the same two things – credentials and data . In response , Stealthbits helps organizations remove inappropriate data access , secure the credentials attackers seek to compromise and exploit , and detect , prevent , and mitigate advanced threats at the system , directory , and data layers of your environment .
To help shine a light on where you ’ re most vulnerable , Stealthbits Technologies has engineered and conducted a comprehensive assessment of select data repositories , Active Directory , and Windows infrastructure . The analysis detailed in the pages to follow will provide clear insight into the security stature of your credentials and data .
DATA SECURITY
Data Access Governance ( DAG ) aims to provide understanding and oversight into data access , with the added context of data sensitivity , usage , and ownership as pivot-points for determining proper access rights ( i . e . achieving a Least Privilege Access model ).
In a recent study published by the SANS institute of 12 separate data breaches , it was determined that “ only 14 % of the information stolen by an adversary was needed by the owner of the compromised account .”
This fact clearly illustrates the need for tighter data access controls , as the overwhelming majority of the data stolen by attackers was practically handed to them . ◊
PRESENTED BY
DOWNLOAD WHITEPAPERS AT :
WWW . INTELLIGENTDATACENTRES . COM / WHITEPAPERS
www . intelligentdatacentres . com Issue 20
15