Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

Stealthbits to Present at Gartner Identity & Access Management Summit in London

March 17, 2014

HAWTHORNE, NJ, MARCH 17, 2014 – Stealthbits Technologies Inc., leading supplier of unstructured data and Microsoft infrastructure solutions, announced today that they will be exhibiting at the Gartner Identity & Access Management Summit in London, England, United Kingdom starting Monday, March 17, 2014. Specializing in unstructured data entitlement analytics, Stealthbits has partnered with many of the industry’s leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.

“In many of the biggest and most recent data breach events, it was unstructured, user-generated data sitting on shared network drives and collaboration portals that was stolen and leaked to the public.” says Adam Laub, VP of Marketing for Stealthbits. “Additionally, the data that was stolen was done so by employees within the organization that had access to the data. The real problem was that they had more access than they needed and they abused their access privileges. This is far more common than most would think, and it’s a problem that can be effectively addressed with a proper Identity & Access Management solution that has been given the visibility needed into Unstructured Data repositories like File Shares and SharePoint Sites.”

Because Active Directory Security Groups are commonly applied to multiple areas of an organization’s IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. Stealthbits’ ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data – a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.

Summit attendees who would like to learn more about Stealthbits’ capabilities and approach are invited to visit booth S2 on the exhibit hall floor at the Park Plaza Westminster Bridge, London. Alternatively, attendees are welcome to attend a live presentation made by Jonathan Sander, Stealthbits’ Strategy & Research Officer, on Tuesday, March 18th at 10:35AM in the Showcase Theater, Solution Showcase, Level-1, titled “Unstructured Data in IAM Programs – 2 Customer Examples”.

For more information, visit http://www.Stealthbits.com, email sales@Stealthbits.com, or call +1-201-447-9300.


EXECUTIVE QUOTE:

Jonathan Sander, Strategy & Research Officer, Stealthbits Technologies

“We see Identity Access Management and Identity Governance programs as one of the key drivers for both Data Access Governance and Active Directory clean up. That’s being echoed by our customers and our many partners in the IAM ecosystem.”


ANALYST QUOTE:

Earl Perkins, Research VP, Gartner, Inc.

“In the years ahead, unstructured and semistructured data access governance will represent a differentiating capability for IGA solutions in IAM markets.” EMC Gains Needed Identity Governance, Administration and Analytics With Aveksa Acquisition, 19 August 2013, Earl Perkins


ADDITIONAL RESOURCES

For more information on Stealthbits’ Data Access Governance solutions, visit http://www.Stealthbits.com/data-access-governance-suite

For information on integrating Stealthbits’ solutions with IAM platforms, visit http://www.Stealthbits.com/solutions/by-business-need/integrate-unstructured-data-with-iam

© 2022 Stealthbits Technologies, Inc.