StealthAUDIT for ISIM eliminates that blind spot! Through agent-less file system and SharePoint permission scanning techniques, as well as deep insight into Active Directory, STEALTHbits creates the entitlement catalog that is missing from unstructured data repositories and feeds it directly to ISIM. The result – automated access governance over unstructured data, using the same workflows ISIM users leverage today.
Extend the Investment in IBM Security Identity Manager
Rather than introduce another solution, resulting in the need for more budget and IT work-hours, extend ISIM’s value into unstructured data
Automated Access Management for Unstructured Data
Request, Provision, Review, and Revoke Access to your critical File Shares and SharePoint Sites
With a repeatable process allowing business users to request access, and data custodians to review, revoke, and attest access, deliver the right access to the right people every time – reducing the risk of data loss and insider theft due to over provisioned or improper access privileges
A complete audit trail of all requests and changes enables streamlined proof of compliance