STEALTHbits Technologies to Exhibit at RSA Conference 2013

Share Article

STEALTHbits Technologies to demonstrate high-performance entitlement analytics platform at RSA Conference 2013.

...there is wide acknowledgement that most data protection programs are blind to where Active Directory users and groups actually have access across the enterprise.

STEALTHbits Technologies – today announced that they will be exhibiting at RSA Conference 2013 opening February 25 in San Francisco, CA. The theme of this year’s RSA Conference is “Security in Knowledge: Mastering data. Securing the world.” STEALTHbits’ flagship StealthAUDIT solution addresses the conference theme by providing deep visibility and control over enterprise data.

STEALTHbits’ message re-enforces several of the key conference tracks including: Data Security & Privacy, Governance, Risk & Compliance, and Identity & Access Management. “StealthAUDIT is a high-performance entitlement analytics platform” explains Sean Cataldo, STEALTHbits VP of Product Management. “We’re deployed in about a third of the Fortune 100 helping c-level security executives address pressing access & data governance needs that impact their Brand, Revenue and Customer Retention. Across our customer base there is wide acknowledgement that most data protection programs are blind to where Active Directory users and groups actually have access across the enterprise.”

StealthAUDIT for Data & Access Governance enables full data lifecycle management from mitigating high-risk conditions to enabling entitlement reviews and automating access provisioning workflows. Conference attendees who would like to see a demonstration of the StealthAUDIT platform are invited to visit booth #2555 on the exhibit floor.

About STEALTHbits Technologies

STEALTHbits Technologies enables IT Control Through Visibility offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Adam Laub
Follow us on
Visit website