|By Marketwired .||
|March 17, 2014 06:00 AM EDT||
HAWTHORNE, NJ and LONDON, UNITED KINGDOM -- (Marketwired) -- 03/17/14 -- STEALTHbits Technologies Inc., leading supplier of unstructured data and Microsoft infrastructure solutions, announced today that they will be exhibiting at the Gartner Identity & Access Management Summit in London, England, United Kingdom starting Monday, March 17, 2014. Specializing in unstructured data entitlement analytics, STEALTHbits has partnered with many of the industry's leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.
"In many of the biggest and most recent data breach events, it was unstructured, user-generated data sitting on shared network drives and collaboration portals that was stolen and leaked to the public," said Adam Laub, VP of Marketing for STEALTHbits. "Additionally, the data that was stolen was done so by employees within the organization that had access to the data. The real problem was that they had more access than they needed and they abused their access privileges. This is far more common than most would think, and it's a problem that can be effectively addressed with a proper Identity & Access Management solution that has been given the visibility needed into Unstructured Data repositories like File Shares and SharePoint Sites."
Because Active Directory Security Groups are commonly applied to multiple areas of an organization's IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. STEALTHbits' ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data -- a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.
Summit attendees who would like to learn more about STEALTHbits' capabilities and approach are invited to visit Stand S2 on the exhibit hall floor at the Park Plaza Westminster Bridge, London. Alternatively, attendees are welcome to attend a live presentation made by Jonathan Sander, STEALTHbits' Strategy & Research Officer, on Tuesday, March 18 at 10:35 a.m. in the Showcase Theater, Solution Showcase, Level-1, titled "Unstructured Data in IAM Programs - 2 Customer Examples."
Jonathan Sander, Strategy & Research Officer, STEALTHbits Technologies
"We see Identity Access Management and Identity Governance programs as one of the key drivers for both Data Access Governance and Active Directory clean up. That's being echoed by our customers and our many partners in the IAM ecosystem."
Earl Perkins, Research VP, Gartner, Inc.
"In the years ahead, unstructured and semistructured data access governance will represent a differentiating capability for IGA solutions in IAM markets." EMC Gains Needed Identity Governance, Administration and Analytics With Aveksa Acquisition, 19 August 2013, Earl Perkins
For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance-suite
For information on integrating STEALTHbits' solutions with IAM platforms, visit http://www.stealthbits.com/solutions/by-business-need/integrate-unstructured-data-with-iam
ABOUT STEALTHbits Technologies
STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits' solutions bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of how access is being granted and who has access to critical unstructured data resources like File Systems and SharePoint.
With this enhanced visibility, organizations of any size can efficiently and confidently:
- Identify, Isolate, and Remediate Open Access Risks
- Address high-visibility projects and initiatives like Identity & Access Management, and Active Directory Clean-up and Consolidation
- Fulfill Audit & Compliance requirements across multiple standards
- Obtain complete visibility into where and how access has been granted
Visit www.stealthbits.com for more information.
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Oct. 20, 2016 06:00 PM EDT Reads: 814
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
Oct. 20, 2016 05:30 PM EDT Reads: 2,765
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
Oct. 20, 2016 05:30 PM EDT Reads: 828
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Oct. 20, 2016 05:15 PM EDT Reads: 3,560
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 20, 2016 05:15 PM EDT Reads: 10,960
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Oct. 20, 2016 03:45 PM EDT Reads: 877
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Oct. 20, 2016 03:45 PM EDT Reads: 2,654
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Oct. 20, 2016 03:00 PM EDT Reads: 3,750
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Oct. 20, 2016 03:00 PM EDT Reads: 5,863
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 20, 2016 02:15 PM EDT Reads: 837
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Oct. 20, 2016 02:15 PM EDT Reads: 2,638
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Oct. 20, 2016 02:15 PM EDT Reads: 9,556
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
Oct. 20, 2016 01:45 PM EDT Reads: 2,129
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 20, 2016 01:45 PM EDT Reads: 7,846
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Oct. 20, 2016 01:30 PM EDT Reads: 5,054