Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

STEALTHbits Technologies to Exhibit at Whitehall Media’s 7th biannual Identity Management Conference

November 5, 2013

Stealthbits to showcase unstructured data integration into 3rd party IAM platforms for Access Governance over File System and SharePoint data

HAWTHORNE, NJ, NOVEMBER 6th, 2013 – Stealthbits Technologies today announced they will be exhibiting at Whitehall Media’s 7th biannual Identity Management Conference in London, England, United Kingdom on Wednesday, November 6, 2013.  Specializing in unstructured data entitlement analytics, Stealthbits has partnered with many of the industry’s leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.

“Stealthbits’ solutions bridge the gap between Active Directory and Unstructured Data repositories, providing a previously unavailable view of how access is being granted and who has access to critical data stored across File Shares and SharePoint Sites,” said Jeff Warren, VP, Product Management at Stealthbits. “By finally being able to understand access and identify who actually owns the data, we’re able to transform the way in which access is granted so that Identity & Access Management solutions can authoritatively control that access.  Enabling owners to control access to their data not only streamlines the process, it ensures the decisions are being made by the appropriate people. The end result is that users get the access that they need when they need it, and no more.”

Because Active Directory Security Groups are commonly applied to multiple areas of an organization’s IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well.  As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. Stealthbits’ ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data – a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.

Conference attendees who would like to learn more about Stealthbits’ capabilities and approach are invited to visit stand #10 on the exhibit hall floor at the Hotel Russell, London.

For more information, visit www.Stealthbits.com, email sales@Stealthbits.com, or call +1-201-447-9300


About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies enables ‘Control Through Visibility’ offering the industry’s most comprehensive platform for the management of IT security, compliance, and operations. Stealthbits’ Data & Access Governance solutions provide unmatched visibility into unstructured data, and feed directly into IAM frameworks enabling complete Access Governance controls over File Systems, SharePoint, and more.  Visit us online at www.Stealthbits.com and follow Stealthbits on Twitter.

# # #

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

© 2022 Stealthbits Technologies, Inc.