Date post: | 31-Dec-2015 |
Category: |
Documents |
Upload: | letitia-roberts |
View: | 216 times |
Download: | 2 times |
Whitebox Security
Data Governance
Cybersecurity, Milano 9 Aprile 2014
What Is Data Governance?
“The unstructured data held by enterprises continues to grow at explosive rates. Security controls have failed and the result is serious enterprise risk exposure”.
Who has access to what?
Where is the sensitive data?
Who did what? (When, where and how)
Who reviewed and approved what?
Whitebox Security 2013 © All Rights Reserved. 2
Gartner: Jeffrey Wheatman, June 2012
Why Should You Care?
BUSINESSLocate sensitive data. Identify & assign owners. Get usage visibility. Manage risk.
SECURITYClassify data. Create access policies. Monitor Activities. Detect usage anomalies.
OPERATIONSAutomate access management efforts. Remove stale resources. Be effective.
COMPLIANCEMange controls. Certify access to data and applications. Automate access requests.
Whitebox Security 2013 © All Rights Reserved. 3
Who Is Whitebox Security?
•Founded 2007, Pioneered Intelligent Access Governance, award winning innovator .
•Backed by the European EuroStars™ program .•Based in Tel Aviv with strong presence in EMEA &
APAC markets .•Fast growing, 50+ customers, 250% yearly
growth.
Whitebox Security 2013 © All Rights Reserved. 4
WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE
WHITEBOX SECURITY SOLUTIONS
STRUCTURED DATA
HOME GROWN APPLICATIONS, 3RD
PARTY.. ,
UNSTRUCTURED DATA
FILES, SHAREPOINT, EXCHANGE, AD, NAS,
ALFRESCO
WhiteOPS™ Solution Based Approach
Identity Intelligence
Activity Monitoring Entitlements Analytics Access Certification Request Automation
SEMI STRUCTURED DATA
ORACLE, SAP, SIEBEL, DYNAMIX.. ,
Whitebox Security 2012 © All Rights Reserved. 5
Access Governance
The WhiteOPS™ ArchitectureFile Servers, NAS Devices
Active Directory®
Exchange®,SharePoint
,®Alfresco
Security Systems
Whitebox Security 2013 © All Rights Reserved. 6
WhiteOPS™
BAM
WPC
But, Customers Are Asking Us To:
Whitebox Security 2013 © All Rights Reserved.
BE HYBRID, SUPPORT ON-PREMISE & CLOUD ENVIRONMENTS
BE ELASTIC, SUPPORT UNSTRUCTURED INFORMATION & STRUCTURED INFORMATION
BE FAST, TELL ME WHEN BAD THINGS HAPPEN, NOT A WEEK AFTER
7
Holistic Approach To Data Governance
Whitebox Security 2013 © All Rights Reserved. 8
“Personnel involved in access approval, certification and remediation will find anintelligence gathering and reporting tool such as WhiteOPS™ useful”.
Earl Perkins, 2012 Cool Vendors In Security, Gartner
Data ClassificationOwner Identification
Usage Profiling
Unified Access PoliciesAccess Certification
Request Automation
Activity MonitoringIdentity Monitoring
Data Enrichment
The WhiteOPS™ Key Advantages
•Simple implementation & quick turnover .•Real-Time monitoring of access to data.
•Resource access protection using policy rules.•Support for on-premise and cloud data stores .
•Support for applications (ERP, CRM, etc.)•Address the needs of of IT and Business .
Whitebox Security 2013 © All Rights Reserved. 9