April 15, 2013, Hawthorne, NJ - STEALTHbits Technologies, a leading developer of Data and Access Governance solutions announces the IBM has validated StealthAUDIT as Ready for IBM Security Intelligence. Customer's of IBM's Security Identity Manager (ISIM) platform can now integrate with StealthAUDIT to automate governance of their file system and SharePoint repositories.
ISIM is the market leading Identity and Access Governance solution providing automated policy-based user provisioning to applications and systems. The platform is highly valued for reducing cost, complexity and risk associated with managing user roles, identities and access rights across the IT infrastructure.
Unstructured data, which lacks a centralized entitlement store, sits outside normal identity and access controls making it the final frontier for automated governance. With as much as 80% of corporate information residing in file systems and SharePoint, there is a great need for automated visibility and control over these types of data repositories, especially if an organization hopes to avoid the consequence of data loss.
With StealthAUDIT, organizations can use ISIM to provision, review, modify and revoke access to file systems and SharePoint using the same workflows they are accustomed to for application and system access.
“The growing importance of Identity Access Governance makes the integration between StealthAUDIT and ISIM an obvious win for our clients,” said Sean Cataldo, VP of Product Management for STEALTHbits. “We are very pleased that IBM has certified our product. Together, StealthAUDIT and ISIM offer a simple, automated and seamless mechanism for helping organizations standardize their approach to provisioning, protecting and reporting on access to their data.”
About Ready for IBM Security Intelligence Program
Ready for IBM Security Intelligence program validates partner integrations with IBM Security software and represents the solution integrations in the IBM Security section of the Ready for IBM Security Intelligence Showcase. This includes partners working to complete Industry Frameworks, Solution Initiatives, and Specialties or other offerings with a dependency on validating integrations with IBM Security Software.
About STEALTHbits Technologies
STEALTHbits Technologies, Inc. enables Control Through Visibility offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at http://www.stealthbits.com/ and follow STEALTHbits on Twitter.
# # #
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.