IBM Certifies StealthAUDIT as Engine to Feed ISIM Unstructured Data Intelligence

STEALTHbits Technologies, a leading developer of Data and Access Governance solutions announces that IBM has validated StealthAUDIT as 'Ready for IBM Security Intelligence.'

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
STEALTHbits Technologies, Inc. Logo

STEALTHbits Technologies, Inc.

"Together, StealthAUDIT and ISIM offer a simple, automated and seamless mechanism for helping organizations standardize their approach to provisioning, protecting and reporting on access to their data.” - Sean Cataldo, STEALTHbits Technologies, Inc.

Hawthorne, NJ (PRWEB) April 23, 2013

STEALTHbits Technologies, a leading developer of Data and Access Governance solutions announces that IBM has validated the StealthAUDIT Management Platform (SMP) as 'Ready for IBM Security Intelligence'. Customers of IBM’s Security Identity Manager (ISIM) platform can now integrate with StealthAUDIT to automate governance of their file system and SharePoint repositories.

ISIM is the market leading Identity and Access Governance solution providing automated policy-based user provisioning to applications and systems. The platform is highly valued for reducing cost, complexity and risk associated with managing user roles, identities and access rights across the IT infrastructure.

Unstructured data, which lacks a centralized entitlement store, sits outside normal identity and access controls making it the final frontier for automated governance. With as much as 80% of corporate information residing in file systems and SharePoint, there is a great need for automated visibility and control over these types of data repositories, especially if an organization hopes to avoid the consequence of data loss.

With StealthAUDIT, organizations can use ISIM to provision, review, modify and revoke access to file systems and SharePoint using the same workflows they are accustomed to for application and system access.

“The growing importance of Identity Access Governance makes the integration between StealthAUDIT and ISIM an obvious win for our clients,” said Sean Cataldo, VP of Product Management for STEALTHbits. “We are very pleased that IBM has certified our product. Together, StealthAUDIT and ISIM offer a simple, automated and seamless mechanism for helping organizations standardize their approach to provisioning, protecting and reporting on access to their data.”

Companies interested in the IBM Security Identity Manager (ISIM) and StealthAUDIT integration can contact Charlie Palella at STEALTHbits - Charlie(dot)palella(at)stealthbits(dot)com.    

About STEALTHbits Technologies

STEALTHbits Technologies enables IT Control Through Visibility offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.

About Ready for IBM Security Intelligence Program

Ready for IBM Security Intelligence program validates partner integrations with IBM Security software and represents the solution integrations in the IBM Security section of the Ready for IBM Security Intelligence Showcase. This includes partners working to complete Industry Frameworks, Solution Initiatives, and Specialties or other offerings with a dependency on validating integrations with IBM Security Software. https://www-304.ibm.com/partnerworld/wps/servlet/ContentHandler/isv_com_dvm_techval_security


Contact

Follow us on: Contact's Twitter