SOURCE: STEALTHbits Technologies

STEALTHbits Technologies

October 27, 2016 06:00 ET

STEALTHbits Included in Gartner 2016 Market Guide for File Analysis Software

HAWTHORNE, NJ--(Marketwired - Oct 27, 2016) - STEALTHbits Technologies Inc., a leading data security software company focused on protecting an organization's credentials and sensitive information, has been included as a representative vendor in Gartner's 2016 Market Guide for File Analysis Software. STEALTHbits can support listed use cases such as Governance/Policy Management, Risk Mitigation, and Efficiency/Optimization.

As stated in the guide authored by Gartner Research Director, Alan Dayley, and others, "File analysis enables data architects, legal and security professionals, storage managers, and business analysts to understand and manage unstructured data stores, reduce risk and costs, and make better information management decisions for unstructured data."

Adam Laub, STEALTHbits' Senior Vice President of Product Marketing, said, "STEALTHbits has spent years of focus and development effort on the subjects of file analysis and the management and security of unstructured data, and we're very proud to be listed as a representative vendor in Gartner's 2016 Market Guide for File Analysis Software. Gartner understands, like we and our customers do, the struggles associated with understanding and controlling the millions of files spread across every corner of any enterprise, which is why we've built a robust product portfolio to address these struggles and an extensive product roadmap to continue our quest of making unstructured data security a problem of the past."

STEALTHbits had two products included in the guide -- StealthAUDIT and the STEALTHbits File Activity Monitor. Both are capable of helping organizations of all sizes analyze and make sense of their data.

Added Laub, "It's incredibly important for companies to focus on the security of their unstructured data -- where it is, who's creating it, who owns it, what's in it, who has access to it, and what users are doing with the access they've been granted. Only when a process for discovering, auditing, and governing this information is established, can an organization truly state that they are taking a proactive step in securing their files."

To learn more about StealthAUDIT, visit https://www.stealthbits.com/products/stealthaudit-management-platform/data-access-governance.

To learn more about the STEALTHbits "Stand-Alone" File Activity Monitor, visit https://www.stealthbits.com/products/stealthbits-file-activity-monitor.

Source: Gartner, Market Guide for File Analysis Software, September 19, 2016
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About STEALTHbits Technologies

Identify threats. Secure data. Reduce risk.

STEALTHbits Technologies is a data security software company focused on protecting an organization's credentials and sensitive information. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

For more information, visit http://www.stealthbits.com, email sales@stealthbits.com, or call +1-201-447-9300.

The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

Contact Information