StealthAUDIT Reviews

3 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 6.9 out of 100

Do you work for this company? Learn how we help vendors

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-1 of 1)

Companies can't remove reviews or game the system. Here's why.
March 11, 2020
Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
We use StealthAUDIT to preform system auditing on our file system and our active directory. It generates useful reports to inform us of changes made to users accounts, identifies nested groups, and open shares. This software shows you a lot of data about your file permissions and user accounts to help resolve potential issues.This software will also show you duplicated groups, meaning groups that have the exact same people in multiple groups.
  • Identify nested groups.
  • Display open shares.
  • Exporting data out of the application.
  • Scanning into child domains.
StealthAUDIT is great if you need historical information about changes that are going on in your environment. However, if you are looking at getting real-time information you will need to use StealthBits other product StealthIntercept.
For what the software does, it does it well. It has helped us to do housekeeping and clean up file permission. I wish that the real-time scanning software was bundled into this software.
Read this authenticated review

What is StealthAUDIT?

STEALTHbits Technologies, headquartered in Hawthorne, offers the StealthAUDIT data access governance platform, supporting the location of sensitive data, the discovery of who has access to it, and assessment of associated risk.
Categories:  Data Governance

StealthAUDIT Technical Details

Operating Systems: Unspecified
Mobile Application:No