News

8/12/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Whitebox Securitys New Version Accelerates Compliance & Data Governance

WhiteOPSTM increases management oversight, delivers 360O forensics, and provides "What If" analysis

Tel Aviv and Sunnyvale, California, 12 August 2014 Whitebox Securitys WhiteOPSTM version 3.3 further accelerates data governance and compliance with a high-level compliance portal, simplified entitlements and identities forensics, and out-of-the-box best practices, among other features.

Data governance and compliance are critical, says Maor Goldberg, CEO of Whitebox Security. Reducing insurance liability and preventing fines and lawsuits are just a few real-world issues that WhiteOPS directly addresses.

WhiteOPS determines who can and has accessed structured, semistructured, and unstructured data, delivering secure access to ERP, CRM, SharePoint, Exchange, file servers, NAS/SAN, Active Directory, and homegrown applications, no matter the location cloud or in-house to ensure that unauthorized data breaches can be prevented and detected, protecting against internal and external threats.

WhiteOPS determines sensitive data, reviews and authorizes access, tracks data access patterns, and detects unauthorized access in real-time. It treats compliance as an ongoing process, not a single point in time, facilitating compliance with Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations.

The new version offers a multilingual portal for senior management, including an access governance dashboard, giving a high-level overview of activities and intelligent access review. Its simplified 3600 entitlements and identity forensics deliver complete information about entitlements, roles, users, and interconnections, including a What If analysis engine for simulating permissions changes. An easy-to-use self-service for access request saves time for both IT and management.

WhiteOPS now offers out-of-the-box best practices for usage pattern-based, content, and metadata-based data classification to further streamline implementation. The entitlements integration kit allows for easy and automatic collection and analysis of entitlements from every organizational application for structured, unstructured, and semistructured data. The new version also includes application monitors for Google Drive, Alfresco ECM, Siemens Teamcenter (PLM), Hitachi NAS, and EMC Isilon.

Data is free flowing across applications and storage locations, concluded Mr. Goldberg. It needs to be protected and tracked in all its forms, combinations and permutations. Thats what we designed WhiteOPS to do. Every new feature accelerates the process.

About Whitebox Security

Whitebox Security helps organizations identify and protect sensitive data against internal and external threats. Its comprehensive solutions protect structured, unstructured, and semistructured data across the data center and the cloud. Leveraging crowd-power, Whitebox ensures quick deployment, implementation, and long-term maintenance with minimal training. It lets organizations maintain complete secure data governance, tracking, understanding, and analyzing who, what, when, where, and how their information is being accessed while remaining in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations. Whitebox Security was founded in 2007. Customers include organizations in defense, financial services, high tech, retail, government, telecom, and travel. Visit www.whiteboxsecurity.com for more information. Follow us on Twitter, LinkedIn, & Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.