News

8/12/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Whitebox Securitys New Version Accelerates Compliance & Data Governance

WhiteOPSTM increases management oversight, delivers 360O forensics, and provides "What If" analysis

Tel Aviv and Sunnyvale, California, 12 August 2014 Whitebox Securitys WhiteOPSTM version 3.3 further accelerates data governance and compliance with a high-level compliance portal, simplified entitlements and identities forensics, and out-of-the-box best practices, among other features.

Data governance and compliance are critical, says Maor Goldberg, CEO of Whitebox Security. Reducing insurance liability and preventing fines and lawsuits are just a few real-world issues that WhiteOPS directly addresses.

WhiteOPS determines who can and has accessed structured, semistructured, and unstructured data, delivering secure access to ERP, CRM, SharePoint, Exchange, file servers, NAS/SAN, Active Directory, and homegrown applications, no matter the location cloud or in-house to ensure that unauthorized data breaches can be prevented and detected, protecting against internal and external threats.

WhiteOPS determines sensitive data, reviews and authorizes access, tracks data access patterns, and detects unauthorized access in real-time. It treats compliance as an ongoing process, not a single point in time, facilitating compliance with Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations.

The new version offers a multilingual portal for senior management, including an access governance dashboard, giving a high-level overview of activities and intelligent access review. Its simplified 3600 entitlements and identity forensics deliver complete information about entitlements, roles, users, and interconnections, including a What If analysis engine for simulating permissions changes. An easy-to-use self-service for access request saves time for both IT and management.

WhiteOPS now offers out-of-the-box best practices for usage pattern-based, content, and metadata-based data classification to further streamline implementation. The entitlements integration kit allows for easy and automatic collection and analysis of entitlements from every organizational application for structured, unstructured, and semistructured data. The new version also includes application monitors for Google Drive, Alfresco ECM, Siemens Teamcenter (PLM), Hitachi NAS, and EMC Isilon.

Data is free flowing across applications and storage locations, concluded Mr. Goldberg. It needs to be protected and tracked in all its forms, combinations and permutations. Thats what we designed WhiteOPS to do. Every new feature accelerates the process.

About Whitebox Security

Whitebox Security helps organizations identify and protect sensitive data against internal and external threats. Its comprehensive solutions protect structured, unstructured, and semistructured data across the data center and the cloud. Leveraging crowd-power, Whitebox ensures quick deployment, implementation, and long-term maintenance with minimal training. It lets organizations maintain complete secure data governance, tracking, understanding, and analyzing who, what, when, where, and how their information is being accessed while remaining in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations. Whitebox Security was founded in 2007. Customers include organizations in defense, financial services, high tech, retail, government, telecom, and travel. Visit www.whiteboxsecurity.com for more information. Follow us on Twitter, LinkedIn, & Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14633
PUBLISHED: 2018-09-25
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The at...
CVE-2018-14647
PUBLISHED: 2018-09-25
Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming larg...
CVE-2018-10502
PUBLISHED: 2018-09-24
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exist...
CVE-2018-11614
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Members Fixed in version 2.4.25. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
CVE-2018-14318
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The specific flaw exists within the handling of ...