whitebox security data governance cybersecurity, milano 9 aprile 2014

10
Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Upload: letitia-roberts

Post on 31-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Whitebox Security

Data Governance

Cybersecurity, Milano 9 Aprile 2014

Page 2: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

What Is Data Governance?

“The unstructured data held by enterprises continues to grow at explosive rates. Security controls have failed and the result is serious enterprise risk exposure”.

Who has access to what?

Where is the sensitive data?

Who did what? (When, where and how)

Who reviewed and approved what?

Whitebox Security 2013 © All Rights Reserved. 2

Gartner: Jeffrey Wheatman, June 2012

Page 3: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Why Should You Care?

BUSINESSLocate sensitive data. Identify & assign owners. Get usage visibility. Manage risk.

SECURITYClassify data. Create access policies. Monitor Activities. Detect usage anomalies.

OPERATIONSAutomate access management efforts. Remove stale resources. Be effective.

COMPLIANCEMange controls. Certify access to data and applications. Automate access requests.

Whitebox Security 2013 © All Rights Reserved. 3

Page 4: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Who Is Whitebox Security?

•Founded 2007, Pioneered Intelligent Access Governance, award winning innovator .

•Backed by the European EuroStars™ program .•Based in Tel Aviv with strong presence in EMEA &

APAC markets .•Fast growing, 50+ customers, 250% yearly

growth.

Whitebox Security 2013 © All Rights Reserved. 4

Page 5: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE

WHITEBOX SECURITY SOLUTIONS

STRUCTURED DATA

HOME GROWN APPLICATIONS, 3RD

PARTY.. ,

UNSTRUCTURED DATA

FILES, SHAREPOINT, EXCHANGE, AD, NAS,

ALFRESCO

WhiteOPS™ Solution Based Approach

Identity Intelligence

Activity Monitoring Entitlements Analytics Access Certification Request Automation

SEMI STRUCTURED DATA

ORACLE, SAP, SIEBEL, DYNAMIX.. ,

Whitebox Security 2012 © All Rights Reserved. 5

Access Governance

Page 6: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

The WhiteOPS™ ArchitectureFile Servers, NAS Devices

Active Directory®

Exchange®,SharePoint

,®Alfresco

Security Systems

Whitebox Security 2013 © All Rights Reserved. 6

WhiteOPS™

BAM

WPC

Page 7: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

But, Customers Are Asking Us To:

Whitebox Security 2013 © All Rights Reserved.

BE HYBRID, SUPPORT ON-PREMISE & CLOUD ENVIRONMENTS

BE ELASTIC, SUPPORT UNSTRUCTURED INFORMATION & STRUCTURED INFORMATION

BE FAST, TELL ME WHEN BAD THINGS HAPPEN, NOT A WEEK AFTER

7

Page 8: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Holistic Approach To Data Governance

Whitebox Security 2013 © All Rights Reserved. 8

“Personnel involved in access approval, certification and remediation will find anintelligence gathering and reporting tool such as WhiteOPS™ useful”.

Earl Perkins, 2012 Cool Vendors In Security, Gartner

Data ClassificationOwner Identification

Usage Profiling

Unified Access PoliciesAccess Certification

Request Automation

Activity MonitoringIdentity Monitoring

Data Enrichment

Page 9: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

The WhiteOPS™ Key Advantages

•Simple implementation & quick turnover .•Real-Time monitoring of access to data.

•Resource access protection using policy rules.•Support for on-premise and cloud data stores .

•Support for applications (ERP, CRM, etc.)•Address the needs of of IT and Business .

Whitebox Security 2013 © All Rights Reserved. 9

Page 10: Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014