Agent-less data collection. Powerful analysis tools. Bulk remediation.
The StealthAUDIT Management Platform is the backbone of the STEALTHbits product line. Its open architecture, small footprint, and powerful collection capabilities ensure that our products are flexible enough to provide value in any IT environment.
AD Inventory and Collections
It all starts with Active Directory. We collect all of the objects, settings, configurations and permissions from AD and correlate them with metadata, activity information and permissions from the systems that AD controls access to.
The vast majority of StealthAUDIT data comes from agentless scans and log collection. This enables the remote collection of thousands of data points across dozens of system and application types and reduces our footprint in your environment.
Speed and Scalability
Our low-profile architecture combined with our powerful scans allows us to scale to the largest environments in the world and run at top speed while we do it.