HAWTHORNE, NJ--(Marketwired - Oct 6, 2015) - STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced today that recent breach events are driving the urgent need for organizations to have unprecedented visibility into the access of sensitive information stored on Network Attached Storage (NAS) devices. These NAS devices, such as the Isilon data storage systems, house terabytes of unstructured data that are the primary target of most hackers and rogue employees The need to monitor access of these files, and not just data within critical applications, is quickly rising in priority for data security professionals.

"Auditing and monitoring Isilon environments and understanding sensitive data access and activity is an increasingly complex technical challenge, and at the same time, growing rapidly in importance," noted Adam Laub, STEALTHbits' SVP of Product Marketing. "Every organization using Isilon NAS devices has untold quantities of unstructured data, and much of that data is sensitive. Knowing who is accessing it, when, and what they're doing with it is crucial to preventing insider security threats."

First deployed in early 2014, STEALTHbits File Activity Monitoring for Isilon provides both the technology to gather file access activity across the Isilon environment, and the analytics to provide immediate and valuable context about what that activity means for Security, Operational, and Audit purposes, including:

  • Sensitive Files Accessed, Modified, Deleted
  • Suspicious Activity
  • Privilege Escalations (Permission/Ownership)
  • Admin Snooping
  • Open Share Exploits 
  • Monitoring and Auditing File Deletions and Moves
  • Most Active / Least Active Locations

"Whether it's a financial institution investigating a possible rogue employee, a healthcare facility protecting their HIPAA-compliant patient records, or the early drafts of a public company's earnings press release, enterprises need to know who is accessing files and what they're doing with them," added Carol Volk, STEALTHbits Senior Vice President of Marketing and Product Management. "Our File Activity Monitoring for Isilon does exactly that, and also creates the audit trail documentation organizations need to satisfy legal and compliance requirements."

To learn about STEALTHbits File Activity Monitoring for Isilon, visit http://www.stealthbits.com/solutions/by-use-case/activity-monitoring.

ABOUT STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits is a data security software company. We help organizations ensure the right people have the right access to the right information. By giving our customers insight into who has access and ownership of their unstructured data, and protecting against malicious access, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit http://www.stealthbits.com, email sales@stealthbits.com, or call +1-201-447-9300.

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

Contact Information:

Dan Chmielewski
Madison Alexander PR