News

8/12/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Whitebox Securitys New Version Accelerates Compliance & Data Governance

WhiteOPSTM increases management oversight, delivers 360O forensics, and provides "What If" analysis

Tel Aviv and Sunnyvale, California, 12 August 2014 Whitebox Securitys WhiteOPSTM version 3.3 further accelerates data governance and compliance with a high-level compliance portal, simplified entitlements and identities forensics, and out-of-the-box best practices, among other features.

Data governance and compliance are critical, says Maor Goldberg, CEO of Whitebox Security. Reducing insurance liability and preventing fines and lawsuits are just a few real-world issues that WhiteOPS directly addresses.

WhiteOPS determines who can and has accessed structured, semistructured, and unstructured data, delivering secure access to ERP, CRM, SharePoint, Exchange, file servers, NAS/SAN, Active Directory, and homegrown applications, no matter the location cloud or in-house to ensure that unauthorized data breaches can be prevented and detected, protecting against internal and external threats.

WhiteOPS determines sensitive data, reviews and authorizes access, tracks data access patterns, and detects unauthorized access in real-time. It treats compliance as an ongoing process, not a single point in time, facilitating compliance with Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations.

The new version offers a multilingual portal for senior management, including an access governance dashboard, giving a high-level overview of activities and intelligent access review. Its simplified 3600 entitlements and identity forensics deliver complete information about entitlements, roles, users, and interconnections, including a What If analysis engine for simulating permissions changes. An easy-to-use self-service for access request saves time for both IT and management.

WhiteOPS now offers out-of-the-box best practices for usage pattern-based, content, and metadata-based data classification to further streamline implementation. The entitlements integration kit allows for easy and automatic collection and analysis of entitlements from every organizational application for structured, unstructured, and semistructured data. The new version also includes application monitors for Google Drive, Alfresco ECM, Siemens Teamcenter (PLM), Hitachi NAS, and EMC Isilon.

Data is free flowing across applications and storage locations, concluded Mr. Goldberg. It needs to be protected and tracked in all its forms, combinations and permutations. Thats what we designed WhiteOPS to do. Every new feature accelerates the process.

About Whitebox Security

Whitebox Security helps organizations identify and protect sensitive data against internal and external threats. Its comprehensive solutions protect structured, unstructured, and semistructured data across the data center and the cloud. Leveraging crowd-power, Whitebox ensures quick deployment, implementation, and long-term maintenance with minimal training. It lets organizations maintain complete secure data governance, tracking, understanding, and analyzing who, what, when, where, and how their information is being accessed while remaining in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations. Whitebox Security was founded in 2007. Customers include organizations in defense, financial services, high tech, retail, government, telecom, and travel. Visit www.whiteboxsecurity.com for more information. Follow us on Twitter, LinkedIn, & Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9978
PUBLISHED: 2019-03-24
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
CVE-2019-9977
PUBLISHED: 2019-03-24
The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants.
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.