DLP, Virtual Entitlement Stores & Reporting Enhancements
April 15, 2013, Hawthorne, NJ - STEALTHbits Technologies, a leading developer of Data and Access Governance solutions announces the latest release of its flagship platform, StealthAUDIT v6.2.
As the IT security and compliance landscape evolves under the increasing risk of attack and scrutiny from regulators, companies need better Governance over Access and Unstructured Data. StealthAUDIT meets this need by integrating sensitive content discovery and analysis with its market leading Data & Access Governance Suite. Organizations will now be better equipped to fend off attack and regulatory risk by correlating Content with Access – all without incurring the upfront cost and complexity of managing multiple platforms.
“Sensitive content awareness is a critical component of any IT risk management program and Data & Access Governance in particular,” said Kevin Foisy, Co-founder and Chief Software Architect for STEALTHbits. “Leveraging this integration enhances StealthAUDIT’s risk analysis capabilities and remediation methodologies, providing our clients a more complete view of their security posture and practical means of response.”
Additionally, StealthAUDIT v6.2 boasts tight integration with Identity & Access Management (IAM) platforms eliminating the blind spot of governing access to unstructured data. StealthAUDIT’s unique integration informs IAM platforms of the group access, permissions and ownership for any data resource. With this added visibility, Identity & Access Management platforms can extend their Visibility and Control across the enterprise. IAM platforms can now provision, review, modify and revoke access to data with native workflows just as they do for applications.
“The evolution of the Identity Access Governance landscape makes the integration between our product and leading IAM vendors an obvious extension of our core Data and Access Governance business,” said Sean Cataldo, VP of Product Management for STEALTHbits. “This integration enables our clients to automate the governance of unstructured data within their existing IAM platforms, simplifying the complex interactions and workflows needed to provision access properly.”
Finally, StealthAUDIT’s Access Information Center has undergone several enhancements enabling faster and more intuitive searching for resources and programmatic integrations with other components of the STEALTHbits portfolio and third party solutions.
About STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits Technologies, Inc. enables Control Through Visibility offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at http://www.stealthbits.com/ and follow STEALTHbits on Twitter.
# # #
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.