|By Marketwired .||
|March 17, 2014 06:00 AM EDT||
HAWTHORNE, NJ and LONDON, UNITED KINGDOM -- (Marketwired) -- 03/17/14 -- STEALTHbits Technologies Inc., leading supplier of unstructured data and Microsoft infrastructure solutions, announced today that they will be exhibiting at the Gartner Identity & Access Management Summit in London, England, United Kingdom starting Monday, March 17, 2014. Specializing in unstructured data entitlement analytics, STEALTHbits has partnered with many of the industry's leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.
"In many of the biggest and most recent data breach events, it was unstructured, user-generated data sitting on shared network drives and collaboration portals that was stolen and leaked to the public," said Adam Laub, VP of Marketing for STEALTHbits. "Additionally, the data that was stolen was done so by employees within the organization that had access to the data. The real problem was that they had more access than they needed and they abused their access privileges. This is far more common than most would think, and it's a problem that can be effectively addressed with a proper Identity & Access Management solution that has been given the visibility needed into Unstructured Data repositories like File Shares and SharePoint Sites."
Because Active Directory Security Groups are commonly applied to multiple areas of an organization's IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. STEALTHbits' ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data -- a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.
Summit attendees who would like to learn more about STEALTHbits' capabilities and approach are invited to visit Stand S2 on the exhibit hall floor at the Park Plaza Westminster Bridge, London. Alternatively, attendees are welcome to attend a live presentation made by Jonathan Sander, STEALTHbits' Strategy & Research Officer, on Tuesday, March 18 at 10:35 a.m. in the Showcase Theater, Solution Showcase, Level-1, titled "Unstructured Data in IAM Programs - 2 Customer Examples."
Jonathan Sander, Strategy & Research Officer, STEALTHbits Technologies
"We see Identity Access Management and Identity Governance programs as one of the key drivers for both Data Access Governance and Active Directory clean up. That's being echoed by our customers and our many partners in the IAM ecosystem."
Earl Perkins, Research VP, Gartner, Inc.
"In the years ahead, unstructured and semistructured data access governance will represent a differentiating capability for IGA solutions in IAM markets." EMC Gains Needed Identity Governance, Administration and Analytics With Aveksa Acquisition, 19 August 2013, Earl Perkins
For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance-suite
For information on integrating STEALTHbits' solutions with IAM platforms, visit http://www.stealthbits.com/solutions/by-business-need/integrate-unstructured-data-with-iam
ABOUT STEALTHbits Technologies
STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits' solutions bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of how access is being granted and who has access to critical unstructured data resources like File Systems and SharePoint.
With this enhanced visibility, organizations of any size can efficiently and confidently:
- Identify, Isolate, and Remediate Open Access Risks
- Address high-visibility projects and initiatives like Identity & Access Management, and Active Directory Clean-up and Consolidation
- Fulfill Audit & Compliance requirements across multiple standards
- Obtain complete visibility into where and how access has been granted
Visit www.stealthbits.com for more information.
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
SYS-CON Events announced today that kintone has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. kintone promotes cloud-based workgroup productivity, transparency and profitability with a seamless collaboration space, build your own business applic...
Apr. 18, 2015 08:00 PM EDT Reads: 1,469
Apr. 18, 2015 07:45 PM EDT Reads: 1,739
Apr. 18, 2015 07:30 PM EDT Reads: 1,682
Apr. 18, 2015 07:15 PM EDT Reads: 1,808
Apr. 18, 2015 07:15 PM EDT Reads: 1,864
Apr. 18, 2015 06:45 PM EDT Reads: 1,732
Apr. 18, 2015 06:30 PM EDT Reads: 1,999
Apr. 18, 2015 06:15 PM EDT Reads: 2,384
Apr. 18, 2015 06:00 PM EDT Reads: 1,940
Apr. 18, 2015 06:00 PM EDT Reads: 1,772
Apr. 18, 2015 06:00 PM EDT Reads: 2,513
Apr. 18, 2015 05:45 PM EDT Reads: 1,795
Apr. 18, 2015 05:15 PM EDT Reads: 2,342
Apr. 18, 2015 05:15 PM EDT Reads: 3,082
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists will discuss how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations m...
Apr. 18, 2015 05:00 PM EDT Reads: 1,669