June 10, 2013, Hawthorne, NJ - Stealthbits Technologies, a leading developer of data and access governance solutions and Magix Security, an IT Risk and Security consulting firm, announced a partnership to offer Stealthbits’ Data & Access Governance solutions to South African enterprises and Magix’ customers worldwide.
Stealthbits’ Data & Access Governance solutions provide complete visibility into unstructured data, enabling organizations of any size to quickly Discover, Prioritize, Remediate and Protect against high-risk access conditions across Active Directory, File Systems, SharePoint, and beyond. With unstructured data expected to increase by more than 600% in the next 5 years and the continued concern with high profile and damaging data breaches, organizations can turn to Stealthbits’ solutions for a pragmatic approach to mitigating security risk by:
- Highlighting and remediating where the greatest levels of risk exist (Open Access Remediation)
- Integration of unstructured data entitlements in existing Identity & Access Management platforms (ISIM, Aveksa, FIM)
- Reducing unstructured data volume through low-level activity analysis (Stale Data Clean-up)
- Real-time Monitoring and Blocking of Active Directory & File System changes, including fine grain administrative user control (Change & Access Monitoring)
Magix has a 10-year track record of providing expert consultation and specialized services to help companies across South Africa manage their IT risk and security postures. The company’s services and solutions span the monitoring (user, data, infrastructure and vulnerability), cybercrime detection and prevention, identity management and onsite solutions (data leakage, device control and trusted computing) environments. Magix’s established client base includes some of South Africa’s largest financial services companies as well as businesses in the manufacturing and retail arenas.
“We couldn't be more pleased with our partnership with Magix,” says Ed Hand, VP Corporate Strategy for Stealthbits Technologies. “Magix’s proven success and track record in the IT Security space makes this partnership an obvious choice to begin with, but our shared vision of how to tackle the complex challenges in the unstructured data space is what will truly make this partnership a success for both of our organizations.”
“We have been working with Stealthbits for the past year and are happy to formalise this already well established partnership,” says Hedley Hurwitz, MD of Magix Security. “Stealthbits has significant experience in the Data & Access Governance space and there is an ever increasing need for these types of solutions in South Africa. We are excited about the business opportunities that this partnership will offer to both parties.”
About Magix Security
Magix Security is a specialised IT Risk and Security company. Magix focuses on the risks associated with poorly secured infrastructure, unsecured data and unmonitored user conduct and provides services and on-premise solutions to mitigate these risks. Magix works with leading technology vendors in the IT Security and Counter-Cybercrime industry and combines this with local expertise and intellectual property to provide a focused and cost-effective set of services and solutions to address the needs of the South African market. Magix has a track record of success that spans 10 years in the supply of specialized IT security services and solutions.
About Stealthbits Technologies
Identify threats. Secure data. Reduce risk.
Stealthbits Technologies enables IT ‘Control Through Visibility’ offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, Stealthbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.
# # #
The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.