Unstructured Data into Identity & Access Governance

I’ve written before about the gap in identity and access management solutions related to unstructured data.
When I define unstructured data to people in the Identity Management space, I think the key distinguishing characteristic is that there is no entitlement store with which an IAM or IAG solution can connect to gather entitlement information. 
On File Systems, for example, the entitlements are distributed across shares & folders, inherited through the file tree structure, applied through group memberships that may be many levels deep, and there’s no common security model to make sense of it.
STEALTHbits has the best scanner in the industry (I’ve seen it go head-to-head in POC’s) to gather users, groups, and permissions across unstructured data environments and the most flexible ability to perform analysis that (1) uncovers high-risk conditions (such as open file shares, unused permissions, admin snooping, and more), (2) identifies content owners, and (3) makes it very simple to consume information on entitlements (by user, by group, or by resource).
It’s a gap in the identity management landscape and it’s beginning to show up on customer agendas. Let us know if we can help. Now, here’s a pretty picture:
STEALTHbits adds unstructured data into IAM and IAG solutions.

Source: http://feeds.feedburner.com

Leave a Reply