sb-nz logo
Story image

Micro Focus centralises policy controls for IT security admins

05 Feb 2020

Micro Focus has introduced a new way of centralising policy-driven controls for IT security administrators, bringing endpoint privacy and security into a single solution.

The solution, called Voltage SmartCipher, was created to provide secure collaboration and to simplify unstructured data protection and management.

According to Micro Focus, the exponential growth of sensitive files represents the biggest challenge that information security professionals face. 

By 2025 it is expected that unstructured data will account for up to 80 per cent of the global data volume that will reach 163 zetabytes, ten times more than in 2016. 

In order to attain insights from this growing data set without exposing the organisation to unnecessary risk, organisations must discover and classify files containing sensitive data. By proactively flagging this information, both internal and external users will be able to more effectively share files across multiple platforms in accordance with security and privacy requirements.
Voltage SmartCipher transparently works with any data type, including on-premises or cloud offerings, letting organisations safely leverage information for business value while also protecting the privacy of this unstructured data.

“Whether complying with privacy regulations, such as GDPR or the newly-enacted CCPA, or extending data privacy during collaboration in the cloud for consistency, Voltage SmartCipher and the Micro Focus portfolio protect sensitive data with granular privacy controls for users, applications, and data to reduce privacy breach risk,” says Micro Focus vice president of security, risk & governance solutions, Tony de la Lama. 

“The introduction of Voltage SmartCipher to the market means customers and organisations can now rely on a single, truly transparent solution that comprehensively manages and secures information, detects and responds to data breaches, and enforces identity and access controls.”

Voltage SmartCipher features include:

- Secure collaboration across environments – Voltage SmartCipher’s patented Transparent File Encryption technology embeds access and protection policy around individual files and the data contained within to prevent unauthorised access to content or policy.

- Increase visibility and control with centralised policy management – Enables increased visibility and control over sensitive files with centralised access and use policy managed centrally and enforced locally at a file level. New policies can be dynamically implemented and synchronised with files on endpoints or collaboration platforms.

- Improve and accelerate compliance audits with real-time monitoring, discovery, and classification – Featuring built-in file usage monitoring and alerting that lets enterprises determine when, where, and how individual files are accessed and altered, and by whom, to provide broad control and protection over unstructured data.

- Seamless, non-disruptive implementation – Voltage SmartCipher may be implemented in stages, according to the needs of enterprises, letting administrators map file location and roll-out file protection without disruption.

Story image
As digital transformation grows in A/NZ companies, misconceptions about their role in cloud security abound
While an 81% majority of A/NZ organisations are accelerating their digital transformation, a giant 99% of surveyed respondents say they believe their cloud security provider provides enough protection, according to a Trend Micro study. More
Story image
22 billion records exposed from breaches in 2020 — report
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."More
Story image
UPDATED: RBNZ ascribes data breach to third-party file sharing service
“The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information,” says RBNZ Governor.More