News
8/12/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Whitebox Securitys New Version Accelerates Compliance & Data Governance

WhiteOPSTM increases management oversight, delivers 360O forensics, and provides "What If" analysis

Tel Aviv and Sunnyvale, California, 12 August 2014 Whitebox Securitys WhiteOPSTM version 3.3 further accelerates data governance and compliance with a high-level compliance portal, simplified entitlements and identities forensics, and out-of-the-box best practices, among other features.

Data governance and compliance are critical, says Maor Goldberg, CEO of Whitebox Security. Reducing insurance liability and preventing fines and lawsuits are just a few real-world issues that WhiteOPS directly addresses.

WhiteOPS determines who can and has accessed structured, semistructured, and unstructured data, delivering secure access to ERP, CRM, SharePoint, Exchange, file servers, NAS/SAN, Active Directory, and homegrown applications, no matter the location cloud or in-house to ensure that unauthorized data breaches can be prevented and detected, protecting against internal and external threats.

WhiteOPS determines sensitive data, reviews and authorizes access, tracks data access patterns, and detects unauthorized access in real-time. It treats compliance as an ongoing process, not a single point in time, facilitating compliance with Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations.

The new version offers a multilingual portal for senior management, including an access governance dashboard, giving a high-level overview of activities and intelligent access review. Its simplified 3600 entitlements and identity forensics deliver complete information about entitlements, roles, users, and interconnections, including a What If analysis engine for simulating permissions changes. An easy-to-use self-service for access request saves time for both IT and management.

WhiteOPS now offers out-of-the-box best practices for usage pattern-based, content, and metadata-based data classification to further streamline implementation. The entitlements integration kit allows for easy and automatic collection and analysis of entitlements from every organizational application for structured, unstructured, and semistructured data. The new version also includes application monitors for Google Drive, Alfresco ECM, Siemens Teamcenter (PLM), Hitachi NAS, and EMC Isilon.

Data is free flowing across applications and storage locations, concluded Mr. Goldberg. It needs to be protected and tracked in all its forms, combinations and permutations. Thats what we designed WhiteOPS to do. Every new feature accelerates the process.

About Whitebox Security

Whitebox Security helps organizations identify and protect sensitive data against internal and external threats. Its comprehensive solutions protect structured, unstructured, and semistructured data across the data center and the cloud. Leveraging crowd-power, Whitebox ensures quick deployment, implementation, and long-term maintenance with minimal training. It lets organizations maintain complete secure data governance, tracking, understanding, and analyzing who, what, when, where, and how their information is being accessed while remaining in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, among other regulations. Whitebox Security was founded in 2007. Customers include organizations in defense, financial services, high tech, retail, government, telecom, and travel. Visit www.whiteboxsecurity.com for more information. Follow us on Twitter, LinkedIn, & Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.