About
Subscribe
  • Home
  • /
  • Business
  • /
  • Magix Security and STEALTHbits partner to provide data and access governance expertise to South African market

Magix Security and STEALTHbits partner to provide data and access governance expertise to South African market

Hawthorne, New Jersey, 11 Jun 2013
Hedley Hurwitz, MD of Magix Security.
Hedley Hurwitz, MD of Magix Security.

STEALTHbits Technologies, a leading developer of data and access governance solutions, and Magix Security (Magix), an IT risk and security consulting firm, announced a partnership to offer STEALTHbits' Data & Access Governance solutions to South African enterprises and Magix customers worldwide.

STEALTHbits' Data & Access Governance solutions provide complete visibility into unstructured data, enabling organisations of any size to quickly discover, prioritise, remediate and protect against high-risk access conditions across Active Directory, File Systems, SharePoint and beyond. With unstructured data expected to increase by more than 600% in the next five years and the continued concern with high-profile and damaging data breaches, organisations can turn to STEALTHbits' solutions for a pragmatic approach to mitigating security risk by:

* Highlighting and remediating where the greatest levels of risk exist (Open Access Remediation)
* Integrating unstructured data entitlements in existing identity and access management platforms (ISIM, Aveksa, FIM)
* Reducing unstructured data volume through low-level activity analysis (Stale Data Clean-up)
* Real-time monitoring and blocking of Active Directory & File System changes, including fine grain administrative user control (Change & Access Monitoring)

Magix has a 10-year track record of providing expert consultation and specialised services to help companies across South Africa manage their IT risk and security postures. The company's services and solutions span the monitoring (user, data, infrastructure and vulnerability), cyber crime detection and prevention, identity management, and onsite solutions (data leakage, device control and trusted computing) environments. Magix's established client base includes some of South Africa's largest financial services companies as well as businesses in the manufacturing and retail arenas.

"We couldn't be more pleased with our partnership with Magix," says Ed Hand, VP: Corporate Strategy for STEALTHbits Technologies. "Magix's proven success and track record in the IT security space makes this partnership an obvious choice to begin with, but our shared vision of how to tackle the complex challenges in the unstructured data space is what will truly make this partnership a success for both of our organisations."

"We have been working with STEALTHbits for the past year and are happy to formalise this already well-established partnership," says Hedley Hurwitz, MD of Magix Security. "STEALTHbits has significant experience in the data and access governance space and there is an ever-increasing need for these types of solutions in South Africa. We are excited about the business opportunities this partnership will offer to both parties."

Share

Magix Security

Magix Security is a specialised IT risk and security company. Magix focuses on the risks associated with poorly secured infrastructure, unsecured data and unmonitored user conduct, and provides services and on-premise solutions to mitigate these risks. Magix works with leading technology vendors in the IT security and counter-cyber-crime industry and combines this with local expertise and intellectual property to provide a focused and cost-effective set of services and solutions to address the needs of the South African market. Magix has a track record of success that spans 10 years in the supply of specialised IT security services and solutions.

STEALTHbits Technologies

STEALTHbits Technologies enables IT 'Control Through Visibility' offering the industry's most comprehensive platform for visibility into IT security, compliance and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server and more to provide deep insight into the health, operations and security of the environment.

For more information, visit http://www.stealthbits.com/, e-mail sales@stealthbits.com. This e-mail address is being protected from spambots. You need JavaScript enabled to view it. Or call (+1) 201 447 9300.

Editorial contacts

Hedley Hurwitz
Magix Security
(+27) 11 258 4442
hedleyh@magix.co.za