SOURCE: STEALTHbits Technologies
HAWTHORNE, NJ and LONDON, UNITED KINGDOM--(Marketwired - Mar 17, 2014) - STEALTHbits Technologies Inc., leading supplier of unstructured data and Microsoft infrastructure solutions, announced today that they will be exhibiting at the Gartner Identity & Access Management Summit in London, England, United Kingdom starting Monday, March 17, 2014. Specializing in unstructured data entitlement analytics, STEALTHbits has partnered with many of the industry's leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.
"In many of the biggest and most recent data breach events, it was unstructured, user-generated data sitting on shared network drives and collaboration portals that was stolen and leaked to the public," said Adam Laub, VP of Marketing for STEALTHbits. "Additionally, the data that was stolen was done so by employees within the organization that had access to the data. The real problem was that they had more access than they needed and they abused their access privileges. This is far more common than most would think, and it's a problem that can be effectively addressed with a proper Identity & Access Management solution that has been given the visibility needed into Unstructured Data repositories like File Shares and SharePoint Sites."
Because Active Directory Security Groups are commonly applied to multiple areas of an organization's IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. STEALTHbits' ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data -- a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.
Summit attendees who would like to learn more about STEALTHbits' capabilities and approach are invited to visit Stand S2 on the exhibit hall floor at the Park Plaza Westminster Bridge, London. Alternatively, attendees are welcome to attend a live presentation made by Jonathan Sander, STEALTHbits' Strategy & Research Officer, on Tuesday, March 18 at 10:35 a.m. in the Showcase Theater, Solution Showcase, Level-1, titled "Unstructured Data in IAM Programs - 2 Customer Examples."
For more information, visit http://www.stealthbits.com, email firstname.lastname@example.org, or call +1-201-447-9300.
Jonathan Sander, Strategy & Research Officer, STEALTHbits Technologies
"We see Identity Access Management and Identity Governance programs as one of the key drivers for both Data Access Governance and Active Directory clean up. That's being echoed by our customers and our many partners in the IAM ecosystem."
Earl Perkins, Research VP, Gartner, Inc.
"In the years ahead, unstructured and semistructured data access governance will represent a differentiating capability for IGA solutions in IAM markets." EMC Gains Needed Identity Governance, Administration and Analytics With Aveksa Acquisition, 19 August 2013, Earl Perkins
For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance-suite
For information on integrating STEALTHbits' solutions with IAM platforms, visit http://www.stealthbits.com/solutions/by-business-need/integrate-unstructured-data-with-iam
ABOUT STEALTHbits Technologies
STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits' solutions bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of how access is being granted and who has access to critical unstructured data resources like File Systems and SharePoint.
With this enhanced visibility, organizations of any size can efficiently and confidently:
- Identify, Isolate, and Remediate Open Access Risks
- Address high-visibility projects and initiatives like Identity & Access Management, and Active Directory Clean-up and Consolidation
- Fulfill Audit & Compliance requirements across multiple standards
- Obtain complete visibility into where and how access has been granted
Visit www.stealthbits.com for more information.