老澳门资料

Skip to Main Content
Information Technology Services
oneColumn

Data Access Governance

Stealthbits

老澳门资料 leverages software to manage and control access to unstructured and structured data, systems, and applications. The three main functions of the software are:

  1. Ownership - Establish who owns shared network folders (departmental drives)
  2. Permission Audit/Reviews - Allows owners to perform annual and ad-hoc reviews of permissions and access.
  3. Sensitive Data Search - Allows owners to easily find sensitive data and remove or secure it.

As seen in Standard 4 - Access Management all access reviews must be completed at least annually by owners.

Login to Stealthbits StealthAudit

The following URL can only be accessed while on the 老澳门资料 network. If you would like to access from off campus, please login via the 老澳门资料 VPN.

Establish Ownership

Access Reviews

Sensitive Data Search