CopyPastehas never been so tasty!

Controlling the Threat of High Risk Shares: STEALTHsession

by anonymous

  • 0
  • 0
  • 0
The video recording of the STEALTHsession on Controlling the Threat of High Risk Repositories, featuring Adam Laub, VP, Marketing, and Brett Fernicola, Director of Research & Development at STEALTHbits Technologies.

This eSeminar features an overview of High Risk shares, as well as a tutorial of how to identify and control them using the StealthAUDIT Management Platform for Data and Access Governance, featuring the Access Information Center. Features include:

• Reduce Risk of data leakage and/or theft by locking down and recertifying permissions to High Risk data
• Help enforce a "Least Privilege Access" model
• Automate the identification of "High Risk" data, reducing the manpower and the number of tools needed to perform this activity
• And more!

Due to time constraints, the demonstration of the Access Information Center was removed from this video. To request a fully-functional, free trial of SMP for Data and Access Governance, including the AIC, or to attend and extended demonstration, please visit us at

This webinar was part of STEALTHbits' ongoing STEALTHsession series, which covers a new topic each Wednesday from 12:00 PM to 12:30 PM EST. To sign up to receive notification and registration information for future STEALTHsessions, please register for the STEALTHsession list here: .

Add A Comment: