New Software Gives Companies Greater Control of Unstructured Data

New Software Gives Companies Greater Control of Unstructured Data

Likewise application enables data management, governance and analytics

BELLEVUE, Wash., December 1, 2011 – Likewise announced today new software to better access, secure, manage and audit unstructured data across multiple platforms – financial files, medical records, office documents, media and big data files, which account for nearly half of all stored information.

Companies have been limited in their ability to control unstructured data across multiple platforms. Likewise Data Analytics and Governance, the new application available now as a public software beta, gives organizations greater visibility into their unstructured data for improved security, auditing and compliance.

With 40 percent of unstructured data classified as sensitive and only 14 percent of organizations with a plan for managing that data, it is a critical and growing challenge to secure and govern data, and extract information,” said Barry Crist, CEO, Likewise. “Likewise intersects identity, security and storage to harness and secure data, track and manage who has access to what data, and free its use to make the most of it.”

Likewise Data Analytics and Governance enables organizations to implement a set of automated best practices to secure and manage unstructured data. The application uses analytics to contextualize data with user identity, sensitivity, and other information to mitigate risks, reduce costs and create value.

The software can help organizations understand performance and usage across storage pools, categorize unstructured data to create new applications or lines of business, and exploit data to maximize revenue. Companies can consolidate reporting across data silos, enforce consistent access policies, and manage entitlements from a single web console. The result is a global hierarchical view of an organization’s unstructured data that can identify and remediate root causes of security, performance and access issues.

The problem with unstructured data has grown exponentially over time. It can seem insurmountable, but companies must get their arms around the sensitive data contained in these files,” said Ginny Roth, analyst, Enterprise Strategy Group. “Without the ability to have some glimpse into this data in the wild, companies will be increasingly vulnerable to high profile breaches.”

The new Likewise application integrates with the Likewise Storage Services platform used by OEM network attached storage (NAS) vendors such as HP and EMC-Isilon, and has adapters that support NetApp, EMC-Celerra and other NAS filers.

Key Application Features

• Monitors and audits usage, ownership and classification of data with dashboards and custom reports

• Manages and provisions entitlements from a single, central location• Generates reports that demonstrate compliance, including reports for HIPAA, ITAR, PCI DSS, Sarbanes-Oxley, GLBA and FISMA

• Receives real-time event alerts for policy-driven exception monitoring

• Uses analytics tools to get real-time and historical information on users and groups, file security settings, data sensitivity and access patterns

• Centrally views users, groups and netgroups in Microsoft Active Directory, LDAP or Sun Microsystems’ Network Information Service (NIS)

• Identifies all CIFS and NFS users and workloads using NAS controllers

• Accepts events and log data from various sources through a predefined RESTful API

• Provides support for global environments and storage arrays with high workloads

• Feeds information to existing SIEM or reporting tools

• Works with NAS devices using the Likewise Storage Services platform, as well as NetApp and EMC-Celerra NAS devices

Pricing and Availability

The beta version is available today for qualifying customers with pricing that starts at $18,000.  For more information on Likewise Data Analytics and Governance, visit http://likewise.com/products/beta/.

About Likewise Storage Services

The Likewise Storage Services platform, used by such OEM storage vendors as HP and EMC Isilon, offers a consistent security model for file-based access and cross-platform, unified storage across physical, virtual and cloud environments. Likewise Storage Services provides integrated identity and access management, as well as secure access to data from Windows, Unix and Linux systems. Supported protocols include SMB/CIFS 1.0, 2.0, 2.1, NFS 3.0, and a RESTful API. Likewise Storage Services is available with a commercial license from Likewise Software.

About Likewise

Likewise offers an integrated software platform for identity, security and storage targeting two distinct markets, OEM storage vendors and enterprise IT organizations. Likewise offers applications to help enterprise IT organizations mitigate risk and drive greater value from their unstructured data. Likewise enables organizations to provide both access to and control of their data across mixed network environments. More information is available at the company’s website, www.likewise.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…