|By Marketwired .||
|September 2, 2014 06:00 AM EDT||
HAWTHORNE, NJ -- (Marketwired) -- 09/02/14 -- STEALTHbits Technologies, Inc., a leading supplier of Data Access Governance solutions for unstructured data and Microsoft Infrastructure Management solutions, announced today complete support for SharePoint Online (part of Microsoft's Office 365 platform) within their flagship product, the StealthAUDIT Management Platform. Through deep understanding of effective access rights, data ownership, and more, StealthAUDIT provides the insight and tools needed to enforce secure collaboration within SharePoint, whether on-premise or in the cloud, ensuring that only the right people have access to the right data.
"Adoption rates for SharePoint Online are increasing within large enterprises," said Jeff Warren, VP of Product Management, STEALTHbits Technologies. "However, a main concern for IT is SharePoint Extranet Access, or allowing users outside of the organization to access content stored within SharePoint. SharePoint Online makes external sharing an even more integrated part of the SharePoint experience, and what we've developed will help organizations of any size alleviate the concerns they have around the security of their data in Microsoft's SharePoint Online environments."
There are two primary ways users can take advantage of granting outside users access to SharePoint:
1. Sharing a site with an individual user, by sending them an invitation
2. Providing an external sharing link for anonymous access to documents
According to Microsoft, "Anonymous guest links could potentially be forwarded or shared with other people, who might also be able to view or edit the content without signing in."
StealthAUDIT's deep and complete visibility into data and access across the entire SharePoint ecosystem, combined with simple, easy-to-use Entitlement Review and Self-Service Access Request workflows, enables organizations to significantly reduce the risk of data loss and insider threats. Furthermore, organizations can integrate the SharePoint entitlement catalog that StealthAUDIT creates with any Identity and Access Management platform, including those from existing STEALTHbits partners like SailPoint, RSA/Aveksa, IBM, and Microsoft.
STEALTHbits Technologies has extensive experience in the SharePoint Security and Governance space, with some of the world's largest organizations relying on STEALTHbits' Data Access Governance solutions for SharePoint to:
- Identify access risks like open SharePoint sites and where unprotected "sensitive data" exists
- Monitor SharePoint activity
- Identify owners of SharePoint resources, and more
StealthAUDIT® for Data Access Governance SharePoint Online support is immediately available worldwide.
For more information on StealthAUDIT for Data Access Governance - SharePoint Edition, visit http://www.stealthbits.com/products/stealthaudit-management-platform/sharepoint
Identify threats. Secure data. Reduce risk.
STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership abi...
Mar. 27, 2017 05:00 AM EDT Reads: 11,023
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
Mar. 27, 2017 05:00 AM EDT Reads: 6,130
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Mar. 27, 2017 04:00 AM EDT Reads: 993
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Mar. 27, 2017 03:45 AM EDT Reads: 2,943
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Mar. 27, 2017 03:15 AM EDT Reads: 3,132
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Mar. 27, 2017 03:00 AM EDT Reads: 2,963
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you ...
Mar. 27, 2017 02:15 AM EDT Reads: 4,135
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 27, 2017 01:45 AM EDT Reads: 2,892
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Mar. 27, 2017 01:45 AM EDT Reads: 2,952
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Mar. 27, 2017 01:15 AM EDT Reads: 1,832
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 27, 2017 12:45 AM EDT Reads: 2,054
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Mar. 27, 2017 12:30 AM EDT Reads: 834
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
Mar. 27, 2017 12:00 AM EDT Reads: 3,332
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
Mar. 26, 2017 09:45 PM EDT Reads: 2,048
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Mar. 26, 2017 09:45 PM EDT Reads: 7,609