Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits Named to Gartner Cool Vendors in Security Report for 2013

May 7, 2013

May 7, 2013, Hawthorne, NJ – Stealthbits Technologies, a leading developer of Data Access Governance solutions has been published in the Gartner Cool Vendor in Security Report for Identity and Access Management 2013.

Stealthbits is recognized for the innovative integration between its flagship StealthAUDIT platform and leading Identity and Access Management solutions. StealthAUDIT collects, analyzes and correlates group access, permissions, ownership and content, creating a virtual entitlement store for unstructured data. IAM platforms can then tap into this entitlement store in order to manage access to file systems and SharePoint using native workflows.

“We’re very pleased that Gartner has chosen to recognize our work again”, said Sean Cataldo, VP of Product Management for Stealthbits. “Many of our clients operate in market environments where sharing sensitive data with partners, and sometimes competitors, is necessary. Other clients simply need an efficient way to manage the data access life cycle or enforce separation of duty boundaries around their data. In all cases we see a growing demand for automated access governance for critical data.”

Learn more at http://www.Stealthbits.com/ and follow Stealthbits on Twitter.


About the Gartner Cool Vendor Report

The Gartner Cool Vendor in Security Report for Identity and Access Management 2013 profiles up-and coming technology providers which are representative of the evolution of data analytics and its expanding role in fueling new methods of authentication, sparking changes in intelligent governance. For more information go to www.gartner.com and search for Gartner Article ID: G00247950.


About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies, Inc. enables “Control Through Visibility” offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, Stealthbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment. Learn more at http://www.Stealthbits.com/ and follow Stealthbits on Twitter.

# # #

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

© 2022 Stealthbits Technologies, Inc.