Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits Technologies to Exhibit at Gartner Identity & Access Management Summit

November 15, 2013

Stealthbits to showcase unstructured data integration into 3rd party IAM platforms for Access Governance over File System and SharePoint data

HAWTHORNE, NJ, NOVEMBER 18th, 2013 – Stealthbits Technologies today announced they will be exhibiting at the Gartner Identity & Access Management Summit in Los Angeles, California on Monday, November 18, 2013. Specializing in unstructured data entitlement analytics, Stealthbits has partnered with many of the industry’s leading Identity & Access Management providers to integrate access entitlements from File System and SharePoint resources directly into existing IAM platform workflows.

“Stealthbits’ solutions bridge the gap between Active Directory and Unstructured Data repositories, providing a previously unavailable view of how access is being granted and who has access to critical data stored across File Shares and SharePoint Sites,” said Jeff Warren, VP, Product Management at Stealthbits. “By finally being able to understand access and identify who actually owns the data, we’re able to transform the way in which access is granted so that Identity & Access Management solutions can authoritatively control that access. Enabling owners to control access to their data not only streamlines the process, it ensures the decisions are being made by the appropriate people.  The end result is that users get the access that they need when they need it, and no more.”

Because Active Directory Security Groups are commonly applied to multiple areas of an organization’s IT infrastructure (i.e. File Systems, SharePoint, Exchange, Applications, Databases, etc.), changing group memberships to add or remove user access in one location will in turn affect access to all other resources the group is applied to as well. As a result, simply injecting access entitlements into IAM solutions as-is can actually make matters worse by either revoking legitimate access or inappropriately provisioning more access than is necessary. Stealthbits’ ability to situate the proper access model for unstructured data prior to IAM integration provides both the means to achieve and sustain control over unstructured data – a major win for regulated organizations and those seeking greater security over data that is under tremendous scrutiny and perpetual attack.

Summit attendees who would like to learn more about Stealthbits’ capabilities and approach are invited to visit booth #407 on the exhibit hall floor at the JW Marriott at L.A. Live.

For more information, visit, email, or call +1-201-447-9300

About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies Data & Access Governance solutions provide unmatched visibility into unstructured data, enabling complete Access Governance controls over File Systems, SharePoint, and more. Visit us online at and follow Stealthbits on Twitter.

# # #

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.

© 2022 Stealthbits Technologies, Inc.