News

8/12/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Whitebox Securitys New Version Accelerates Compliance & Data Governance

WhiteOPSTM increases management oversight, delivers 360O forensics, and provides "What If" analysis

Tel Aviv and Sunnyvale, California, 12 August 2014 Whitebox Securitys WhiteOPSTM version 3.3 further accelerates data governance and compliance with a high-level compliance portal, simplified entitlements and identities forensics, and out-of-the-box best practices, among other features.

Data governance and compliance are critical, says Maor Goldberg, CEO of Whitebox Security. Reducing insurance liability and preventing fines and lawsuits are just a few real-world issues that WhiteOPS directly addresses.

WhiteOPS determines who can and has accessed structured, semistructured, and unstructured data, delivering secure access to ERP, CRM, SharePoint, Exchange, file servers, NAS/SAN, Active Directory, and homegrown applications, no matter the location cloud or in-house to ensure that unauthorized data breaches can be prevented and detected, protecting against internal and external threats.

WhiteOPS determines sensitive data, reviews and authorizes access, tracks data access patterns, and detects unauthorized access in real-time. It treats compliance as an ongoing process, not a single point in time, facilitating compliance with Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations.

The new version offers a multilingual portal for senior management, including an access governance dashboard, giving a high-level overview of activities and intelligent access review. Its simplified 3600 entitlements and identity forensics deliver complete information about entitlements, roles, users, and interconnections, including a What If analysis engine for simulating permissions changes. An easy-to-use self-service for access request saves time for both IT and management.

WhiteOPS now offers out-of-the-box best practices for usage pattern-based, content, and metadata-based data classification to further streamline implementation. The entitlements integration kit allows for easy and automatic collection and analysis of entitlements from every organizational application for structured, unstructured, and semistructured data. The new version also includes application monitors for Google Drive, Alfresco ECM, Siemens Teamcenter (PLM), Hitachi NAS, and EMC Isilon.

Data is free flowing across applications and storage locations, concluded Mr. Goldberg. It needs to be protected and tracked in all its forms, combinations and permutations. Thats what we designed WhiteOPS to do. Every new feature accelerates the process.

About Whitebox Security

Whitebox Security helps organizations identify and protect sensitive data against internal and external threats. Its comprehensive solutions protect structured, unstructured, and semistructured data across the data center and the cloud. Leveraging crowd-power, Whitebox ensures quick deployment, implementation, and long-term maintenance with minimal training. It lets organizations maintain complete secure data governance, tracking, understanding, and analyzing who, what, when, where, and how their information is being accessed while remaining in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations. Whitebox Security was founded in 2007. Customers include organizations in defense, financial services, high tech, retail, government, telecom, and travel. Visit www.whiteboxsecurity.com for more information. Follow us on Twitter, LinkedIn, & Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounde...