March 24, 2015
Whitebox Security’s access fulfilment delivers complete access management to critical systems
Tel Aviv--Whitebox Security, a solution provider in the field of data access governance, has enhanced its solutions by adding in the ability to administer permissions, allowing IT to manage access to critical systems on an individual or bulk basis for enhanced compliance.
“We’ve been tracking the access management market for a long time, and we recognized a way to simplify access fulfilment for our clients,” says CEO Maor Goldberg. “Now, IT can manage permissions more quickly and with lower overhead with our new module.”
The new feature further automates compliance across file servers, NAS devices and SharePoint. After an access review, the system will remove the rejected entitlements directly, without requiring the administrators to manually make the changes to each system, greatly streamlining the process.
Business users can access the information they require with the enhanced self-service access request methods. The first is a wizard that allows a user to request permissions, and upon approval, the system automatically updates access. The second can be used within the natural work environment. When an employee comes across a resource in her purview but for which she doesn’t have access, she can simply right click the resource to request access. Nothing needs to be installed on the endpoint.
A standard feature of Whitebox Security’s system is a “What If” simulation, where permissions can be tested to proactively determine the effects will result from the required change. Should the simulation be acceptable, the administrator can simply accept the changes, which will automatically be implemented.
Whitebox Security’s solutions deliver the ability to manage who should be accessing what, when, where, and how. Its customers get complete data access governance for structured, unstructured and semistructured data across organizational applications: SharePoint®, Exchange, File servers, NAS, Active Directory, ERP, CRM, DropBox, Box, Office 365, and homegrown applications, no matter the location – cloud, hybrid or in-house.
The new permissions module reinforces clients’ ability to remain in compliance with regulatory requirements, including Sarbanes-Oxley, HIPAA, PCI, ISO 27001/2, ISO 27799, to name just a few.
“Ultimately, the key to protecting data and managing compliance is to ensure it’s easy to do,” and we deliver streamlined, user friendly data access governance,” concluded Goldberg.