March 4, 2013, Hawthorne, NJ - STEALTHbits Technologies – today announced availability of its Unstructured Data provisioning capability for IBM Security Identity Manager (ISIM). This new feature of STEALTHbits’ flagship StealthAUDIT product enables organizations who have invested in IBM Security Identity Manager to leverage that investment for managing access to unstructured data assets such as file systems and Microsoft SharePoint portals. "IBM Security Identity Manager is very good at providing access management workflows around virtually any system with an accessible entitlement store" explains Matt Flynn, Product Marketing Director at STEALTHbits. "The challenge around unstructured data is that there is no centralized entitlement store. Permissions are applied across disparate systems which often don’t have a common security model. StealthAUDIT provides that requisite entitlement store augmented with critical intelligence making the data actionable."
The new features are part of STEALTHbit’s StealthAUDIT for Data & Access Governance solution. StealthAUDIT creates a virtual entitlement store around unstructured data which can be used to identify data owners, understand access rights, pinpoint which security groups are used to grant access, and more. StealthAUDIT for Data & Access Governance with integration into IBM Security Identity Manager (ISIM) is immediately available. Pricing is per-user and volume discounted.
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
# # #
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.