STEALTHbits Technologies, Inc., a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced the release of their new and pioneering approach to Privilege Access Management (PAM), STEALTHbits Privileged Activity Manager (SbPAM).
The problem with PAM today is that traditional PAM providers focus on controlling access to accounts and their passwords, not on the activities the administrator needs to perform. As data breaches have become more and more common, it is clear – privileged access and administrative rights are essential for attackers to achieve success. Despite significant investments in perimeter and endpoint security, breaches start at the desktop and server layers of an organization’s IT infrastructure and quickly spread through the overabundance of privileged access rights, or standing privilege.
Traditional PAM providers offer minimal reduction of an organization’s attack surface because the privileged accounts they aim to manage still retain their access rights when not in use.
A new approach is needed.
“The PAM market has become both complex and commoditized – it’s like a house of cards waiting to come crashing down, it’s crying out for a change,” said Martin Cannard, Vice President Product Strategy at STEALTHbits. “We are taking a unique approach that addresses the root problem without the convoluted overhead imposed by existing solutions. PAM in its essence is very simple, you need to provide your admins with a clear, audited and secure path to access privileged resources. We have hit the nail on the head with SbPAM and we do the job with minimal overhead and complexity.”
STEALTHbits Privileged Activity Manager (SbPAM) is a third-generation PAM solution, providing administrators the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed, and then returns the environment to a no-access-by-default state immediately upon completion.
Tuned to address the major challenges at the desktop and server layer, as well as critical directories and data repositories like Active Directory and File Systems, SbPAM enables administrators and helpdesk professionals perform their day-to-day activities easily and without the complexity of traditional PAM tools. SbPAM’s new approach focuses on controlling the activity that needs to be performed rather than mapping access to an account, resulting in a reduced attack surface that drastically improves an organization’s overall security posture.
“Seventy-six percent of organizations experience a violation of privileged account policies each year,” noted Steve Brasen, Research Director with IT industry analyst firm, Enterprise Management Associates. “STEALTHbits’ new approach easily layers on top of existing security investments to provide flexible and granular control over individual privileged activities that will prevent unauthorized permissions abuse and breach events.”
SbPAM allows administrators to safely and securing do their job while simultaneously minimizing risk:
- Providing admins with temporal access to systems and applications that require privileged access
- Leveraging existing desktop administrative tools for access
- Allowing them to focus on the activity to be performed rather than the account required for the task
“SbPAM is an incredibly exciting addition to our product and solution portfolio,” said Adam Laub, STEALTHbits’ Chief Marketing Officer. “As a stand-alone solution, it’s wildly innovative and remarkably easy to use. On a more macro level, however, it has great applicability to just about everything we already do. Customers that have been relying on our Privileged Account Discovery capabilities for years, now have a powerful mechanism to remediate the excessive quantity of privileged accounts they find across their desktop and server infrastructure – the very same systems Active Directory is most commonly compromised from. Add these controls and principles to what STEALTHbits does so well at the Active Directory and data layers, and it’s easy to see just how powerful and important this offering is.”
SbPAM significantly reduces the attack surface with:
- Just in time permissions and access for users, which expire upon task completion
- Monitoring and protections of local groups
- Expiration of process-generated permissions that otherwise remain active as artifacts, for example, completion and closure of Kerberos tickets upon completion of the task or process for which the ticket was issued
To learn more about STEALTHbits Privileged Activity Manager, visit https://go.stealthbits.com/stealthbits-privileged-activity-manager-product-page or click here to download your copy of the STEALTHbits Privileged Activity Manager What’s New Product Release Guide.
Also, you can visit https://go.stealthbits.com/sbpam-explainer-video-pr to see a brief overview video, highlighting SbPAM’s just-in-time, tasked-based administrative access management capabilities.
ABOUT STEALTHBITS TECHNOLOGIES
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
Identify threats. Secure data. Reduce risk.
For more information, visit http://www.stealthbits.com/contact or call +1-201-447-9300.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.