Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

Stealthbits Introduces Advanced Workflow Addressing Open Access to Unstructured Data

April 3, 2012

New Solution Eliminates Top Audit Challenge and Reduces Risk by Identifying and Closing Open File Shares

Glen Rock, NJ – April 3, 2012 – Stealthbits Technologies, the provider of the industry’s most comprehensive IT management and compliance platform, today announced the availability of its Open Access Workflow, a new solution designed to reduce risk and improve security around unstructured data by fixing the problem of open access across the file system.

Delivered as part of the Stealthbits Data & Access Governance Solution Set, which is built on the award-winning StealthAUDIT® Management Platform (SMP), Stealthbits’ Open Access Workflow solution automates the process of locking down open access to file system resources through discovery, intelligence and automated remediation. Originally developed to support large organizations with complex IT environments, the solution logic is configurable to meet any organization’s unique requirements enabling them to identify, analyze and remediate risk on unstructured data.

“IT professionals consistently identify open access to unstructured data as a critical challenge, but the size and complexity of the problem often seems too overwhelming to address,” said Matt Flynn, director of Access Governance Solutions at Stealthbits Technologies. “No two organizations are structured the same and there is significant disparity in security models, access controls and audit requirements. As a result of working with many of the largest financial institutions in the world, we’ve developed a proven and pragmatic approach that any organization can take and apply to their own environment to answer critical questions about where sensitive data exists, who owns it, and where the highest risk lays, whether it’s across 100 servers or 10,000.”

Stealthbits’ Open Access Workflow offers a methodology for reducing risk by providing a proven process that identifies and closes open file shares across any network computing environment. By iterating through tasks and scoping data scans based on intelligence, Stealthbits’ unique workflow process enables organizations to eliminate one of their top audit challenges without significant infrastructure investments or time commitments.

Pricing & Availability

Stealthbits’ Open Access Workflow solution is available immediately through Stealthbits. For more information, visit, email or call +1-201-447-9300.

About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies, Inc. offers the industry’s most comprehensive IT management and compliance platform. Built from the ground up to collect, analyze, remediate, and report on data and systems critical to compliance success, Stealthbits’ technology platform provides a single, unified framework for the management of Microsoft infrastructure and beyond, truly bridging the ever-widening gap between IT Management & Compliance groups within organizations large and small. Since 2001, Stealthbits Technologies, Inc. has delivered powerful solution sets that address specific business problems across Active Directory, Exchange, Public Folders, SharePoint, Data and Access Governance, Systems Governance, and BlackBerry and ActiveSync. Learn more at and follow @Stealthbits on Twitter.

Press Contacts:

Bree Bolognese | Jordan Bouclin
SVM Public Relations
(760) 754-7025 | (401) 490-9700 |

Stealthbits and StealthAUDIT are registered trademarks of Stealthbits Technologies, Inc. The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

© 2022 Stealthbits Technologies, Inc.