Welcome!

News Feed Item

STEALTHbits & CrossIdeas Partner to Extend User Access Lifecycle Management to Unstructured Data

HAWTHORNE, NJ and ROME, ITALY -- (Marketwired) -- 07/02/14 -- STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today a new partnership with the Italian-based Identity & Access Governance solution provider CrossIdeas. The integration of STEALTHbits' Data Access Governance solutions with CrossIdeas' IDEAS Identity & Access Governance platform enables CrossIdeas customers to extend the benefits of user access lifecycle management to the unstructured, human-generated data primarily residing in data repositories such as File Systems and SharePoint.

"With unstructured data accounting for up to 80% of corporate data, it is crucial that this last frontier come under management by leading IAM solutions such as CrossIdeas," said John Albanese, VP Sales & Channel Operations at STEALTHbits. "As the leading developer of products that solve critical challenges with unstructured data access rights, we're excited to combine forces with CrossIdeas to expand our footprint in EMEA as we as help to grow CrossIdeas' US market."

STEALTHbits and CrossIdeas offer enterprises a solution to gain complete visibility and control of all forms of corporate data. STEALTHbits' scalable, reliable platform can scan the world's largest unstructured data environments and organize the results in a way that enables advanced analysis, reporting, and action across numerous data types. The combined solution empowers organizations to shift responsibility for making access decisions to the accountable line of business.

"Partnering with STEALTHbits and extending our platform to include unstructured data is crucial to providing the broad-scope governance solutions our customers need, and is a great complement to our existing solutions and relationships," said Andrea Rossi, Vice President, Global Sales & Partners at CrossIdeas. "Our platform is perfectly situated to consume the entitlement and analytics data STEALTHbits provides, immediately enabling our customers to define and enforce access policies within unstructured data repositories that reduce their risk and increase their security."

The combined solution is available worldwide.

ADDITIONAL RESOURCES

For more information about STEALTHbits, visit www.stealthbits.com

For more information about CrossIdeas, visit www.crossideas.com

ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.

Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.

About CrossIdeas
Founded in 2011, CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements. The result is a stronger Risk Aware Enterprise and increased protection of customer investment in Identity Management. Their IDEAS solution bridges the gap between compliance policy and IT infrastructure to enforce access policies in all aspects of identity and access management.

CrossIdeas is headquartered in Rome, Italy and can be reached at www.crossideas.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...