STEALTHbits Technologies Launches Unstructured Data Provisioning Solution for IBM Security Identity Manager

STEALTHbits adds direct IBM ISIM integration to award winning StealthAUDIT access governance solution.

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
StealthAUDIT provides that requisite entitlement store augmented with critical intelligence making the data actionable.

Hawthorne, NJ (PRWEB) March 04, 2013

STEALTHbits Technologies – today announced availability of its Unstructured Data provisioning capability for IBM Security Identity Manager (ISIM). This new feature of STEALTHbits’ flagship StealthAUDIT product enables organizations who have invested in IBM Security Identity Manager to leverage that investment for managing access to unstructured data assets such as file systems and Microsoft SharePoint portals.

"IBM Security Identity Manager is very good at providing access management workflows around virtually any system with an accessible entitlement store" explains Matt Flynn, Product Marketing Director at STEALTHbits. "The challenge around unstructured data is that there is no centralized entitlement store. Permissions are applied across disparate systems which often don’t have a common security model. StealthAUDIT provides that requisite entitlement store augmented with critical intelligence making the data actionable."

The new features are part of STEALTHbit’s StealthAUDIT for Data & Access Governance solution. StealthAUDIT creates a virtual entitlement store around unstructured data which can be used to identify data owners, understand access rights, pinpoint which security groups are used to grant access, and more.

StealthAUDIT for Data & Access Governance with integration into IBM Security Identity Manager (ISIM) is immediately available. Pricing is per-user and volume discounted.

About STEALTHbits Technologies

STEALTHbits Technologies enables IT Control Through Visibility offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.


Contact

Follow us on: Contact's Twitter