Integrating and Controlling Unstructured Data with IAM - STEALTHbits Technologies





The interactive transcript could not be loaded.



Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Aug 27, 2013

Integrate File System and SharePoint permissions with your existing Identity & Access Management platform - http://www.stealthbits.com/by-busines...

Unstructured data is critical to every business. Users collaborate frequently on documents, spreadsheets, and presentations stored within File Systems and other repositories like SharePoint. These files often contain sensitive information, making controlling access to this data critically important to the prevention of security breaches. The challenge, however, is how do you make sure the right users have access to the right data, and any unnecessary access is revoked?

Traditionally, managing access is a function organizations would look to Identity & Access Management (IAM) platforms to provide. IAM solutions often enable non-technical users in an organization to perform entitlement reviews on the resources they own. Additionally, IAM provides assigned business liaisons the ability to actually grant and revoke access to applications and other resources through self-service or automated processes, offloading the access management burden from IT to the business.

The problem is that Identity & Access Management solutions focus on applications, not data. IAM solutions don't work with Unstructured Data because they are blind to the entitlements granted to Active Directory Users and Groups, and the data is too distributed and difficult to understand.

STEALTHbits Technologies enables organizations to take the workflow used for managing access to applications and extend it to unstructured data, allowing for fully-automated Access Governance controls over some of their most sensitive data assets.

STEALTHbits' enterprise-class data scanning engine discovers unstructured data across an organization's environment, creating a single, consolidated entitlement store containing key information such as who owns the data, who has access, and how. Through direct integration with leading Identity & Access Management frameworks and home-grown systems, organizations can now provision, review, and revoke access to unstructured data.

For more information, visit us online at www.stealthbits.com, and follow us at www.facebook.com/STEALTHbits, www.twitter.com/STEALTHbits, or www.linkedin.com/company/stealthbits-tec­hnologies.


When autoplay is enabled, a suggested video will automatically play next.

Up Next

Sign in to add this to Watch Later

Add to