STEALTHbits Technologies to Exhibit at Gartner Identity and Access Management Summit

Share Article

STEALTHbits to showcase unstructured data integration into 3rd party IAM platforms for Access Governance over File System and SharePoint data.

News Image

STEALTHbits Technologies today announced they will be exhibiting at the Gartner Identity & Access Management Summit in Los Angeles, California on Monday, November 18, 2013. Specializing in unstructured data entitlement analytics, STEALTHbits has partnered with many of the industry’s leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.

“STEALTHbits’ solutions bridge the gap between Active Directory and Unstructured Data repositories, providing a previously unavailable view of how access is being granted and who has access to critical data stored across File Shares and SharePoint Sites,” said Jeff Warren, VP, Product Management at STEALTHbits. “By finally being able to understand access and identify who actually owns the data, we’re able to transform the way in which access is granted so that Identity & Access Management solutions can authoritatively control that access. Enabling owners to control access to their data not only streamlines the process, it ensures the decisions are being made by the appropriate people. The end result is that users get the access that they need when they need it, and no more.”

Because Active Directory Security Groups are commonly applied to multiple areas of an organization’s IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. STEALTHbits’ ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data – a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.

Summit attendees who would like to learn more about STEALTHbits’ capabilities and approach are invited to visit booth #407 on the exhibit hall floor at the JW Marriott at L.A. Live.

For more information, visit, email sales(at)stealthbits(dot)com, or call +1-201-447-9300.

About STEALTHbits Technologies, Inc.

STEALTHbits Technologies Data & Access Governance solutions provide unmatched visibility into unstructured data, enabling complete Access Governance controls over File Systems, SharePoint, and more. Visit us online at and follow STEALTHbits on Twitter.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Adam Laub
STEALTHbits Technologies, Inc.
+1 (201) 447-9300
Email >
Visit website