StealthAUDIT provides that requisite entitlement store augmented with critical intelligence making the data actionable.
Hawthorne, NJ (PRWEB) March 04, 2013
STEALTHbits Technologies – today announced availability of its Unstructured Data provisioning capability for IBM Security Identity Manager (ISIM). This new feature of STEALTHbits’ flagship StealthAUDIT product enables organizations who have invested in IBM Security Identity Manager to leverage that investment for managing access to unstructured data assets such as file systems and Microsoft SharePoint portals.
"IBM Security Identity Manager is very good at providing access management workflows around virtually any system with an accessible entitlement store" explains Matt Flynn, Product Marketing Director at STEALTHbits. "The challenge around unstructured data is that there is no centralized entitlement store. Permissions are applied across disparate systems which often don’t have a common security model. StealthAUDIT provides that requisite entitlement store augmented with critical intelligence making the data actionable."
The new features are part of STEALTHbit’s StealthAUDIT for Data & Access Governance solution. StealthAUDIT creates a virtual entitlement store around unstructured data which can be used to identify data owners, understand access rights, pinpoint which security groups are used to grant access, and more.
StealthAUDIT for Data & Access Governance with integration into IBM Security Identity Manager (ISIM) is immediately available. Pricing is per-user and volume discounted.
About STEALTHbits Technologies
STEALTHbits Technologies enables IT Control Through Visibility offering the industry’s most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, operations, and security of the environment.