Welcome!

News Feed Item

STEALTHbits, BOTE Awards Finalist, to Exhibit at TechEd North America 2014 in Houston, Texas

HAWTHORNE, NJ -- (Marketwired) -- 05/12/14 -- STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today that the company will exhibit its products at Microsoft TechEd North America 2014 in Houston starting Monday, May 12, 2014.

Additionally, STEALTHbits announced the company has been nominated as finalists for Best of TechEd North America Awards in two product categories: Messaging and Unified Communications, and SharePoint.

"We're very excited to be exhibiting at TechEd North America for the seventh consecutive year, as well as being nominated as finalists for Best of TechEd (BOTE) North America Awards in the Messaging and Unified Communications, and SharePoint categories," said Adam Laub, VP of Marketing for STEALTHbits. "We've worked very hard to include numerous customer-requested features and enhancements in both products and we are enthusiastic about the recognition we're receiving from Windows IT Pro."

The Best of TechEd (BOTE) North America Awards, produced by Windows IT Pro, recognize the innovative products and services showcased at Microsoft TechEd North America 2014.

Messaging and Unified Communications Category
This category is for email, Exchange add-ons, instant messaging (IM), fax, mobility, unified communications (UC), and Voice over IP (VOIP) solutions, as well as both server and client technologies.

  • StealthAUDIT® for Exchange - StealthAUDIT for Exchange enables organizations to identify risk, track usage, decreases bloat, and secure their MS Exchange Server infrastructure. As an agent-less application, installation times and infrastructure costs are negligible, allowing for rapid ROI -- the result is an enhanced security posture at tremendous cost savings.

    StealthAUDIT's breadth of coverage across the Exchange ecosystem greatly reduces the need for multiple, disparate point solutions, scripting, and manual methods of management. StealthAUDIT for Exchange provides broad, yet surgical insight into not only the Exchange application itself, but the Operating System it's installed upon, Active Directory which it cannot function without, and its ties with the Mobility and Unified Communications infrastructure that relies on Exchange.

    With a broad and deep reach into virtually every aspect of the Exchange ecosystem, StealthAUDIT provides organizations with a single toolset to address the myriad of Exchange management needs. The reduced number of toolsets reduces annual maintenance and support expenditures significantly, freeing up funds for other projects, initiatives, and toolsets that require monetary and time investment. Scheduling facilities allow administrators to automate the fulfillment of manual, time-consuming, repetitive tasks, freeing their time to address pressing issues and project work that helps the organization make progress in short-term and long-term goals.

SharePoint Category
This category covers solutions aimed at helping SharePoint admins, developers, and end users make the most of Microsoft SharePoint (e.g., migration, access management, security, auditing, backup and recovery, performance, social computing, content management, search).

  • StealthAUDIT® for Data Access Governance - SharePoint Edition - SharePoint does not provide a way to enforce policies and standards across entire data farms and the enterprise as a whole, making it impossible to govern access properly to the massive number of files and data contained within the SharePoint ecosystem. StealthAUDIT for Data Access Governance SharePoint Edition enables organizations to ensure only the right people have access to the right data, enforcing secure collaboration through deep understanding of effective access rights, data ownership, access activity, and more.

    Unlike point products designed to address very specific requirements in the management and security of SharePoint, StealthAUDIT's platform-based approach provides organizations with a toolbox of data collection, analysis, remediation, and reporting capabilities to complement the many moving pieces that make up the SharePoint ecosystem as a whole, including dependent and independent systems like the OS, SQL database, IIS and AD.

StealthAUDIT's platform approach provides the ability to not only govern access SharePoint, but to File Shares, Exchange Mailboxes, Active Directory Security Groups, and more. Insight is also provided into Privileged Account access, as well as change and access activities occurring within these environments, providing a single viewpoint for protecting data and mitigating the chance and damage of breach activities.

Conference attendees who would like to learn more about STEALTHbits' capabilities and approach are invited to visit Booth 1940 on the exhibit hall floor at the George R. Brown Conference Center in Houston, Texas.

For more information, visit http://www.stealthbits.com email [email protected], call +1-201-447-9300, or follow STEALTHbits on Twitter (http://www.twitter.com/STEALTHbits)

ADDITIONAL RESOURCES
For more information on STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance-suite

For more information on STEALTHbits' Exchange solutions, visit http://www.stealthbits.com/products/stealthaudit-management-platform/exchange

For more information on the Best of TechEd 2014 Awards, visit http://windowsitpro.com/industry/best-teched-2014-finalists-announced

ABOUT STEALTHbits Technologies
STEALTHbits Technologies specializes in the management and security of unstructured data. STEALTHbits' solutions bridge the gap between Active Directory and unstructured data repositories, providing a previously unavailable view of how access is being granted and who has access to critical unstructured data resources like File Systems and SharePoint.

With this enhanced visibility, organizations of any size can efficiently and confidently:

  • Identify, Isolate, and Remediate Open Access Risks
  • Address high-visibility projects and initiatives like Identity & Access Management, and Active Directory Clean-up and Consolidation
  • Fulfill Audit & Compliance requirements across multiple standards
  • Obtain complete visibility into where and how access has been granted

Visit www.stealthbits.com for more information.

Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage, for instance, is more capable than where we read and write data. In his session at @DevOpsSummit at 20th Cloud Expo, Josh Atwell, a Developer Advocate for NetApp, will discuss the role and value...
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER gives detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPOalso offers sp...
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
They say multi-cloud is coming, but organizations are leveraging multiple clouds already. According to a study by 451 Research, only 21% of organizations were using a single cloud. If you've found yourself unprepared for the barrage of cloud services introduced in your organization, you will need to change your approach to engaging with the business and engaging with vendors. Look at technologies that are on the way and work with the internal players involved to have a plan in place when the ine...