News Releases

Core Security and STEALTHbits Technologies Partner to Extend IAM to Unstructured Data
Core Security Strengthens Position as Identity and Access Management Industry Leader With Data Access Governance Collaboration

SAN FRANCISCO, Feb. 14, 2017 /PRNewswire/ -- RSA Conference -- Core Security®, a leader in Vulnerability, Access Risk Management and Network Detection and Response and STEALTHbits Technologies Inc., a leading cybersecurity software company focused on protecting an organization's credentials and data, today announced a partnership and integration that allows customers to extend Core Security's Identity Access Management to their unstructured data, leveraging the same entitlement workflows used to control access to applications, all from a single interface.

"As the amount of an organization's unstructured data continues to rise, it is becoming more difficult to discover and control sensitive data," said Steve Laubenstein, VP of Worldwide Alliances and Channels for Core Security. "Our partnership with STEALTHbits provides companies with an automated, effective solution to discover, secure, and control access to unstructured data.  This partnership will enable our customer's to control least-privileged access to both applications and unstructured data, reducing the risk of sensitive data being compromised."

Managing and securing unstructured data poses significant challenges that manual methods and legacy point products fail to address. Modern cybersecurity teams seek automated, effective solutions to secure sensitive data, apply a consistent permissions model and enforce least-privileged access control. With approximately 80% of data residing in unstructured environments (like SharePoint, NAS, and cloud storage), governing this content is critical for all organizations. 

"We are thrilled to announce that STEALTHbits is partnering with Core Security to deliver this integrated functionality," said Adam Rosen, VP of DAG Solutions, STEALTHbits Technologies, Inc. "We're bringing together the best of breed in Data Access Governance and Identity and Access Management, affording cybersecurity teams comprehensive access control for both structured and unstructured data." 

Please contact us for more information on this integrated offering.

About Core Security Corporation
Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.

Core Security is headquartered in the USA with offices and operations in South America, Europe, Middle East and Asia. To learn more, contact Core Security at (678) 304-4500 or info@coresecurity.com.

Media Contact
Kari Walker
ZAG Communications for Core Security
+1.703.928.9996
kari@zagcommunications.com

About STEALTHbits Technologies
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization's credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

Identify threats. Secure data. Reduce risk.

For more information, visit http://www.stealthbits.com, email sales@stealthbits.com, or call +1-201-447-9300.

SOURCE Core Security