The video recording of the STEALTHsession on Controlling the Threat of High Risk Repositories, featuring Adam Laub, VP, Marketing, and Brett Fernicola, Director of Research & Development at STEALTHbits Technologies. This eSeminar features an overview of High Risk shares, as well as a tutorial of how to identify and control them using the StealthAUDIT Management Platform for Data and Access Governance, featuring the Access Information Center. Features include: • Reduce Risk of data leakage and/or theft by locking down and recertifying permissions to High Risk data • Help enforce a "Least Privilege Access" model • Automate the identification of "High Risk" data, reducing the manpower and the number of tools needed to perform this activity • And more! Due to time constraints, the demonstration of the Access Information Center was removed from this video. To request a fully-functional, free trial of SMP for Data and Access Governance, including the AIC, or to attend and extended demonstration, please visit us at http://www.stealthbits.com. This webinar was part of STEALTHbits' ongoing STEALTHsession series, which covers a new topic each Wednesday from 12:00 PM to 12:30 PM EST. To sign up to receive notification and registration information for future STEALTHsessions, please register for the STEALTHsession list here: http://j.mp/i3cXDy .
Controlling the Threat of High Risk Shares: STEALTHsession