Tuesday, 10 March 2015 20:46

Anomalix Partners With STEALTHbits to Strengthen IAM Solution Offering Featured

Written by
Rate this item
(0 votes)

HAWTHORNE, NJ, March 10, 2015 – STEALTHbits Technologies Inc., a leading data security company that ensures the right employees have the right access to the right information, announced today that it has partnered with Anomalix, a recognized national Identity and Access Management (IAM) system provider, further expanding the company's network of solution partners.

"STEALTHbits is a perfect fit for our IAM practice," noted Anomalix President Mo Elkhatib. "They have been working for years with the premier IAM software vendors, and our partnership allows us to deliver a comprehensive solution to our customers that would be nearly impossible to do otherwise."

STEALTHbits software complements IAM projects in two ways. First, the company's Active Directory optimization software provides a clean authentication repository that IAM systems rely on to operate effectively, eliminating conditions like blank attributes and toxic group conditions in Active Directory that can trip up IAM software and greatly reduce IAM's value. "The beauty of our Active Directory product is that it can enhance the value of an IAM project before, during, or even after deployment," said Bob Stanton, STEALTHbits' Director of Business Alliances.

More critically, STEALTHbits' Data Access Governance product extends the coverage of IAM software beyond access to applications, and into an enterprise's unstructured data that resides on file shares and SharePoint servers. "Our IAM story is an easy one to tell," added Stanton. "There's a gap in IAM coverage, and we fill that gap, enabling IAM solutions to control and manage access to word documents, excel spreadsheets, presentations, and videos, the places where an organization's most sensitive data often resides."

STEALTHbits' products are available now as part of Anomalix's integrated IAM solutions. To learn more about how Anomalix can deliver a comprehensive, successful IAM solution, visit www.anomalix.com.

About STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today’s greatest threats.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.


ABOUT Anomalix Inc.

Identity Management Experts.

STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today’s greatest threats.

Anomalix is an information security advisory and implementation consultancy that specializes in Identity Management. Anomalix has a singular focus to solve complex Identity Management challenges in a meaningful way that aligns with the business. We help organizations uncover Identity Management requirements and build a custom tailored plan to implement solutions that meet those requirements. Our clients include Fortune 500, national and regional businesses across industry verticals such as Healthcare, Financial Services, Oil & Gas, Retail and Manufacturing.

For more information, visit http://www.anomalix.com, email This email address is being protected from spambots. You need JavaScript enabled to view it., or call +1-800-939.6491

# # #

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

Additional Info

  • Title Tag: Anomalix Partners With STEALTHbits to Strengthen IAM Solution Offering
Read 2649 times Last modified on Thursday, 09 November 2017 15:00

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.