Welcome!

News Feed Item

STEALTHbits Technologies Announces New Insight, Intelligence and Control for Unstructured Data

New Integration With EMC Isilon Scale-Out NAS Helps Customers Better Manage Unstructured Data

HAWTHORNE, NJ -- (Marketwired) -- 08/18/14 -- STEALTHbits Technologies, Inc., leading supplier of software solutions for managing and securing unstructured, human-generated data and critical applications, today announced their flagship product, the StealthAUDIT® Management Platform v6.3, now provides organizations with the ability to achieve new levels of insight, intelligence, and control of their ever growing volumes of unstructured data through new support for the latest release of EMC Isilon scale-out NAS storage (Isilon OneFS 7.1). Together, these solutions enable customers to better manage their unstructured data.

Unstructured human-generated data is exploding at enormous rates within organizations across the globe. According to IDC, Forrester, and Gartner, 80% of enterprise data is unstructured; while Gartner expects an 800% growth in data over the next five years(1). The Isilon and StealthAUDIT v6.3 integration provides enterprises an otherwise unachievable level of control over files stored, including deep, yet clear visibility and insight around permissions associated with files and folders. The integration also allows organizations the ability to determine where access can be reduced, including the ability to assess risk associated with critical and sensitive data with intelligence to involve the data owner during remediation initiatives.

STEALTHbits' solution can be integrated with the Isilon OneFS® 7.1 operating system in part to provide the auditing and compliance reporting capabilities organizations require to support their regulatory initiatives like HIPAA, PCI-DSS, SAS70, and Sarbanes-Oxley. The solution is simple to deploy, manage, and scale, allowing the integrated audit capabilities to continuously provide business value without impacting storage performance or reliability required by global enterprises.

EXECUTIVE QUOTE

Kyle Kennedy, Chief Technology Officer, STEALTHbits Technologies

"The dramatic rise we and organizations are seeing in the amount of unstructured, human-generated data in recent years, and the lack of visibility into who is actually 'using' the data -- empirical insight, and who the data actually belongs to such as a particular person, department, division, etc. -- are essential components of data storage, data management, and enterprise security and risk management. The integration of StealthAUDIT with EMC Isilon OneFS 7.1 truly provides organizations insight and control over their data like never before by effectively managing, securing, and protecting their Isilon storage environment. STEALTHbits Technologies is excited to offer customers these new features and capabilities within the StealthAUDIT solution."

AVAILABILITY

StealthAUDIT v6.3 went generally available worldwide February 24th, 2014

ADDITIONAL RESOURCES

For more information about StealthAUDIT integration with EMC Isilon Scale-Out NAS, visit http://www.stealthbits.com/partners/technology-partners/emc

For more information about STEALTHbits' Data Access Governance solutions, visit http://www.stealthbits.com/data-access-governance

ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.

Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.

Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.

Visit www.stealthbits.com for more information.

(1) From "Managing Massive Unstructured Data Troves: 10 Best Practices", published 2013-07-03 by Chris Preimesberger (http://www.eweek.com/storage/slideshows/managing-massive-unstructured-data-troves-10-best-practices/)

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
As someone who has been dedicated to automation and Application Release Automation (ARA) technology for almost six years now, one of the most common questions I get asked regards Platform-as-a-Service (PaaS). Specifically, people want to know whether release automation is still needed when a PaaS is in place, and why. Isn't that what a PaaS provides? A solution to the deployment and runtime challenges of an application? Why would anyone using a PaaS then need an automation engine with workflow ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.