sb-au logo
Story image

Micro Focus centralises policy controls for IT security admins

05 Feb 2020

Micro Focus has introduced a new way of centralising policy-driven controls for IT security administrators, bringing endpoint privacy and security into a single solution.

The solution, called Voltage SmartCipher, was created to provide secure collaboration and to simplify unstructured data protection and management.

According to Micro Focus, the exponential growth of sensitive files represents the biggest challenge that information security professionals face. 

By 2025 it is expected that unstructured data will account for up to 80 per cent of the global data volume that will reach 163 zetabytes, ten times more than in 2016. 

In order to attain insights from this growing data set without exposing the organisation to unnecessary risk, organisations must discover and classify files containing sensitive data. By proactively flagging this information, both internal and external users will be able to more effectively share files across multiple platforms in accordance with security and privacy requirements.
Voltage SmartCipher transparently works with any data type, including on-premises or cloud offerings, letting organisations safely leverage information for business value while also protecting the privacy of this unstructured data.

“Whether complying with privacy regulations, such as GDPR or the newly-enacted CCPA, or extending data privacy during collaboration in the cloud for consistency, Voltage SmartCipher and the Micro Focus portfolio protect sensitive data with granular privacy controls for users, applications, and data to reduce privacy breach risk,” says Micro Focus vice president of security, risk & governance solutions, Tony de la Lama. 

“The introduction of Voltage SmartCipher to the market means customers and organisations can now rely on a single, truly transparent solution that comprehensively manages and secures information, detects and responds to data breaches, and enforces identity and access controls.”

Voltage SmartCipher features include:

- Secure collaboration across environments – Voltage SmartCipher’s patented Transparent File Encryption technology embeds access and protection policy around individual files and the data contained within to prevent unauthorised access to content or policy.

- Increase visibility and control with centralised policy management – Enables increased visibility and control over sensitive files with centralised access and use policy managed centrally and enforced locally at a file level. New policies can be dynamically implemented and synchronised with files on endpoints or collaboration platforms.

- Improve and accelerate compliance audits with real-time monitoring, discovery, and classification – Featuring built-in file usage monitoring and alerting that lets enterprises determine when, where, and how individual files are accessed and altered, and by whom, to provide broad control and protection over unstructured data.

- Seamless, non-disruptive implementation – Voltage SmartCipher may be implemented in stages, according to the needs of enterprises, letting administrators map file location and roll-out file protection without disruption.

Story image
Attack from DOS: In Zero We Trust
In combination with malware, DDoS attacks on banks have been used to cause distraction so the transfer of stolen funds goes unnoticed. More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
On October 28, go from CX starter to champion with Zendesk
There could not be a better way to get at the heart of this topic than hearing from the experts whose mission it is to make sure customer service is the best of the best.More
Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Link image
The importance of data resilience in the current cybersecurity climate
Protecting an organisation's data is one of the most crucial functions of any CISO. Strategies should be in place where data is stored securely and cost-effectively.More