Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
HAWTHORNE, NJ and ROME, ITALY -- (Marketwired) -- 07/02/14 -- STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, announced today a new partnership with the Italian-based Identity & Access Governance solution provider CrossIdeas. The integration of STEALTHbits' Data Access Governance solutions with CrossIdeas' IDEAS Identity & Access Governance platform enables CrossIdeas customers to extend the benefits of user access lifecycle management to the unstructured, human-generated data primarily residing in data repositories such as File Systems and SharePoint.
"With unstructured data accounting for up to 80% of corporate data, it is crucial that this last frontier come under management by leading IAM solutions such as CrossIdeas," said John Albanese, VP Sales & Channel Operations at STEALTHbits. "As the leading developer of products that solve critical challenges with unstructured data access rights, we're excited to combine forces with CrossIdeas to expand our footprint in EMEA as we as help to grow CrossIdeas' US market."
STEALTHbits and CrossIdeas offer enterprises a solution to gain complete visibility and control of all forms of corporate data. STEALTHbits' scalable, reliable platform can scan the world's largest unstructured data environments and organize the results in a way that enables advanced analysis, reporting, and action across numerous data types. The combined solution empowers organizations to shift responsibility for making access decisions to the accountable line of business.
"Partnering with STEALTHbits and extending our platform to include unstructured data is crucial to providing the broad-scope governance solutions our customers need, and is a great complement to our existing solutions and relationships," said Andrea Rossi, Vice President, Global Sales & Partners at CrossIdeas. "Our platform is perfectly situated to consume the entitlement and analytics data STEALTHbits provides, immediately enabling our customers to define and enforce access policies within unstructured data repositories that reduce their risk and increase their security."
The combined solution is available worldwide.
ADDITIONAL RESOURCES
For more information about STEALTHbits, visit www.stealthbits.com
For more information about CrossIdeas, visit www.crossideas.com
ABOUT STEALTHbits Technologies
STEALTHbits is all about data -- Collecting data. Analyzing data. Protecting data.
Enabling our customers to harness the power of their data and derive information by which to make decisions, solve problems, and streamline business processes is what we do best, and what we've been doing for over a decade.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
About CrossIdeas
Founded in 2011, CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements. The result is a stronger Risk Aware Enterprise and increased protection of customer investment in Identity Management. Their IDEAS solution bridges the gap between compliance policy and IT infrastructure to enforce access policies in all aspects of identity and access management.
CrossIdeas is headquartered in Rome, Italy and can be reached at www.crossideas.com
Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
dchm@madisonalexanderpr.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs