whitebox security data governance cybersecurity, milano 9 ... · whiteops™ intelligent access...

10
Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014

Upload: others

Post on 13-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

Whitebox Security

Data Governance

Cybersecurity, Milano 9 Aprile 2014

Page 2: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

What Is Data Governance?

“The unstructured data held by enterprises continues to grow at explosive rates. Security controls have failed and the result is serious enterprise risk exposure.”

Who has access to what?

Where is the sensitive data?

Who did what? (When, where and how)

Who reviewed and approved what?

Whitebox Security 2013 © All Rights Reserved. 2

Gartner: Jeffrey Wheatman, June 2012

Page 3: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

Why Should You Care?

BUSINESS Locate sensitive data. Identify & assign owners. Get usage visibility. Manage risk.

SECURITY Classify data. Create access policies. Monitor Activities. Detect usage anomalies.

OPERATIONS Automate access management efforts. Remove stale resources. Be effective.

COMPLIANCE Mange controls. Certify access to data and applications. Automate access requests.

Whitebox Security 2013 © All Rights Reserved. 3

Page 4: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

Who Is Whitebox Security?

•Founded 2007, Pioneered Intelligent Access Governance, award winning innovator.

•Backed by the European EuroStars™ program.

•Based in Tel Aviv with strong presence in EMEA & APAC markets.

•Fast growing, 50+ customers, 250% yearly growth.

Whitebox Security 2013 © All Rights Reserved. 4

Page 5: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE

WHITEBOX SECURITY SOLUTIONS

STRUCTURED DATA

HOME GROWN APPLICATIONS, 3RD PARTY, ..

UNSTRUCTURED DATA

FILES, SHAREPOINT, EXCHANGE, AD, NAS, ALFRESCO

WhiteOPS™ Solution Based Approach

Identity Intelligence

Activity Monitoring Entitlements Analytics Access Certification Request Automation

SEMI STRUCTURED DATA

ORACLE, SAP, SIEBEL, DYNAMIX, ..

Whitebox Security 2012 © All Rights Reserved. 5

Access Governance

Page 6: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

The WhiteOPS™ Architecture

File Servers, NAS Devices

Active Directory®

Exchange®, SharePoint®,

Alfresco

Security Systems

Whitebox Security 2013 © All Rights Reserved. 6

WhiteOPS™

BA

M W

PC

Page 7: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

But, Customers Are Asking Us To:

Whitebox Security 2013 © All Rights Reserved.

BE HYBRID, SUPPORT ON-PREMISE & CLOUD ENVIRONMENTS

BE ELASTIC, SUPPORT UNSTRUCTURED INFORMATION &

STRUCTURED INFORMATION

BE FAST, TELL ME WHEN BAD THINGS HAPPEN, NOT A WEEK

AFTER

7

Page 8: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

Holistic Approach To Data Governance

Whitebox Security 2013 © All Rights Reserved. 8

“Personnel involved in access approval, certification and remediation will find an intelligence gathering and reporting tool such as WhiteOPS™ useful.”

Earl Perkins, 2012 Cool Vendors In Security, Gartner

Data Classification Owner Identification

Usage Profiling

Unified Access Policies Access Certification Request Automation

Activity Monitoring Identity Monitoring

Data Enrichment

Page 9: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,

The WhiteOPS™ Key Advantages

•Simple implementation & quick turnover.

•Real-Time monitoring of access to data.

•Resource access protection using policy rules.

•Support for on-premise and cloud data stores.

•Support for applications (ERP, CRM, etc.)

•Address the needs of of IT and Business.

Whitebox Security 2013 © All Rights Reserved. 9

Page 10: Whitebox Security Data Governance Cybersecurity, Milano 9 ... · WHITEOPS™ INTELLIGENT ACCESS GOVERNANCE SUITE WHITEBOX SECURITY SOLUTIONS STRUCTURED ATADATA HOME GROWN APPLICATIONS,