New Software Gives Companies Greater Control of Unstructured Data

New Software Gives Companies Greater Control of Unstructured Data

Likewise application enables data management, governance and analytics

BELLEVUE, Wash., December 1, 2011 – Likewise announced today new software to better access, secure, manage and audit unstructured data across multiple platforms – financial files, medical records, office documents, media and big data files, which account for nearly half of all stored information.

Companies have been limited in their ability to control unstructured data across multiple platforms. Likewise Data Analytics and Governance, the new application available now as a public software beta, gives organizations greater visibility into their unstructured data for improved security, auditing and compliance.

With 40 percent of unstructured data classified as sensitive and only 14 percent of organizations with a plan for managing that data, it is a critical and growing challenge to secure and govern data, and extract information,” said Barry Crist, CEO, Likewise. “Likewise intersects identity, security and storage to harness and secure data, track and manage who has access to what data, and free its use to make the most of it.”

Likewise Data Analytics and Governance enables organizations to implement a set of automated best practices to secure and manage unstructured data. The application uses analytics to contextualize data with user identity, sensitivity, and other information to mitigate risks, reduce costs and create value.

The software can help organizations understand performance and usage across storage pools, categorize unstructured data to create new applications or lines of business, and exploit data to maximize revenue. Companies can consolidate reporting across data silos, enforce consistent access policies, and manage entitlements from a single web console. The result is a global hierarchical view of an organization’s unstructured data that can identify and remediate root causes of security, performance and access issues.

The problem with unstructured data has grown exponentially over time. It can seem insurmountable, but companies must get their arms around the sensitive data contained in these files,” said Ginny Roth, analyst, Enterprise Strategy Group. “Without the ability to have some glimpse into this data in the wild, companies will be increasingly vulnerable to high profile breaches.”

The new Likewise application integrates with the Likewise Storage Services platform used by OEM network attached storage (NAS) vendors such as HP and EMC-Isilon, and has adapters that support NetApp, EMC-Celerra and other NAS filers.

Key Application Features

• Monitors and audits usage, ownership and classification of data with dashboards and custom reports

• Manages and provisions entitlements from a single, central location• Generates reports that demonstrate compliance, including reports for HIPAA, ITAR, PCI DSS, Sarbanes-Oxley, GLBA and FISMA

• Receives real-time event alerts for policy-driven exception monitoring

• Uses analytics tools to get real-time and historical information on users and groups, file security settings, data sensitivity and access patterns

• Centrally views users, groups and netgroups in Microsoft Active Directory, LDAP or Sun Microsystems’ Network Information Service (NIS)

• Identifies all CIFS and NFS users and workloads using NAS controllers

• Accepts events and log data from various sources through a predefined RESTful API

• Provides support for global environments and storage arrays with high workloads

• Feeds information to existing SIEM or reporting tools

• Works with NAS devices using the Likewise Storage Services platform, as well as NetApp and EMC-Celerra NAS devices

Pricing and Availability

The beta version is available today for qualifying customers with pricing that starts at $18,000.  For more information on Likewise Data Analytics and Governance, visit http://likewise.com/products/beta/.

About Likewise Storage Services

The Likewise Storage Services platform, used by such OEM storage vendors as HP and EMC Isilon, offers a consistent security model for file-based access and cross-platform, unified storage across physical, virtual and cloud environments. Likewise Storage Services provides integrated identity and access management, as well as secure access to data from Windows, Unix and Linux systems. Supported protocols include SMB/CIFS 1.0, 2.0, 2.1, NFS 3.0, and a RESTful API. Likewise Storage Services is available with a commercial license from Likewise Software.

About Likewise

Likewise offers an integrated software platform for identity, security and storage targeting two distinct markets, OEM storage vendors and enterprise IT organizations. Likewise offers applications to help enterprise IT organizations mitigate risk and drive greater value from their unstructured data. Likewise enables organizations to provide both access to and control of their data across mixed network environments. More information is available at the company’s website, www.likewise.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What Futuristic Tech Will You See In Your Lifetime?

What Futuristic Tech Will You See In Your Lifetime?

Futuristic Tech The world and what people can do is increasingly being driven by technology. It has already shaped the world we live in, but over the next few decades it is set to shape the world in ways that we can barely imagine. There have already been some great leaps in IoT technology recently,…

The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…