Executive View: StealthDEFEND® - 70366

Report Details

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. 

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title
May 11, 2018

Executive View: StealthDEFEND® - 70366

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. 

Read on KC PLUS

Latest Related Reports

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-party identities puts an extra strain on existing IAM tools but management solutions that provide added…

Analyst Advice

Business Resilience Management (Crisis Roadmap for Beginners)

Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Leadership Brief

Leadership Brief: Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery - 80223

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks or unexpected disruption.

Advisory Note

Advisory Note: Trends in Privileged Access Management for the Digital Enterprise - 71273

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, agile software…

Whitepaper

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische…

Leadership Brief

Leadership Brief: Responding to Cyber Incidents - 80209

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question…

Leadership Brief

Leadership Brief: Access Reviews Done Right - 80195

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always  only the minimum amount of access rights, which are necessary to perform associated tasks. In light of compliance,…

Executive View

Executive View: Ideiio IGA - 80077

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfolio. ideiio, a spun out from IAM systems integrator ProofID, is a new vendor in the IGA space offering IGA…

Executive View

Executive View: Exostar Supplier Risk Management - 79074

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply chain. By building on the capabilities of the Exostar Platform as an industry collaboration…

Executive View

Executive View: Securonix Cloud SIEM and UEBA - 79035

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analytics offered as a fully managed Security Operations Platform in the cloud.


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00