Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
HAWTHORNE, NJ -- (Marketwired) -- 09/02/14 -- STEALTHbits Technologies, Inc., a leading supplier of Data Access Governance solutions for unstructured data and Microsoft Infrastructure Management solutions, announced today complete support for SharePoint Online (part of Microsoft's Office 365 platform) within their flagship product, the StealthAUDIT Management Platform. Through deep understanding of effective access rights, data ownership, and more, StealthAUDIT provides the insight and tools needed to enforce secure collaboration within SharePoint, whether on-premise or in the cloud, ensuring that only the right people have access to the right data.
"Adoption rates for SharePoint Online are increasing within large enterprises," said Jeff Warren, VP of Product Management, STEALTHbits Technologies. "However, a main concern for IT is SharePoint Extranet Access, or allowing users outside of the organization to access content stored within SharePoint. SharePoint Online makes external sharing an even more integrated part of the SharePoint experience, and what we've developed will help organizations of any size alleviate the concerns they have around the security of their data in Microsoft's SharePoint Online environments."
There are two primary ways users can take advantage of granting outside users access to SharePoint:
1. Sharing a site with an individual user, by sending them an invitation
2. Providing an external sharing link for anonymous access to documents
According to Microsoft, "Anonymous guest links could potentially be forwarded or shared with other people, who might also be able to view or edit the content without signing in."
StealthAUDIT's deep and complete visibility into data and access across the entire SharePoint ecosystem, combined with simple, easy-to-use Entitlement Review and Self-Service Access Request workflows, enables organizations to significantly reduce the risk of data loss and insider threats. Furthermore, organizations can integrate the SharePoint entitlement catalog that StealthAUDIT creates with any Identity and Access Management platform, including those from existing STEALTHbits partners like SailPoint, RSA/Aveksa, IBM, and Microsoft.
STEALTHbits Technologies has extensive experience in the SharePoint Security and Governance space, with some of the world's largest organizations relying on STEALTHbits' Data Access Governance solutions for SharePoint to:
Availability
StealthAUDIT® for Data Access Governance SharePoint Online support is immediately available worldwide.
More Resources
For more information on StealthAUDIT for Data Access Governance - SharePoint Edition, visit http://www.stealthbits.com/products/stealthaudit-management-platform/sharepoint
About STEALTHbits
Identify threats. Secure data. Reduce risk.
STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats.
Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that's been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world's largest, most notable organizations, as well as a preferred partner to leaders in technology.
Visit www.stealthbits.com for more information.
Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
dchm@madisonalexanderpr.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs