CopyPastehas never been so tasty!

Controlling the Threat of High Risk Shares: STEALTHsession

by anonymous

  • 0
  • 0
  • 0
122 views
The video recording of the STEALTHsession on Controlling the Threat of High Risk Repositories, featuring Adam Laub, VP, Marketing, and Brett Fernicola, Director of Research & Development at STEALTHbits Technologies.

This eSeminar features an overview of High Risk shares, as well as a tutorial of how to identify and control them using the StealthAUDIT Management Platform for Data and Access Governance, featuring the Access Information Center. Features include:

• Reduce Risk of data leakage and/or theft by locking down and recertifying permissions to High Risk data
• Help enforce a "Least Privilege Access" model
• Automate the identification of "High Risk" data, reducing the manpower and the number of tools needed to perform this activity
• And more!

Due to time constraints, the demonstration of the Access Information Center was removed from this video. To request a fully-functional, free trial of SMP for Data and Access Governance, including the AIC, or to attend and extended demonstration, please visit us at http://www.stealthbits.com.

This webinar was part of STEALTHbits' ongoing STEALTHsession series, which covers a new topic each Wednesday from 12:00 PM to 12:30 PM EST. To sign up to receive notification and registration information for future STEALTHsessions, please register for the STEALTHsession list here: http://j.mp/i3cXDy .

Add A Comment: