-- Logging and Visibility -- Administrators can log who is accessing what, when and how for every transaction across 100s of servers -- Powerful Compliance and Reporting -- Comprehensive reports that prove access and usage policies are aligned with current stringent regulations, including the Health Information Portability and Protection Act (HIPAA), Payment Card Industry Data Security Standard (PCI), Sarbanes-Oxley (SOX) and the International Traffic in Arms Regulations (ITAR) -- Speed and Flexibility -- Administrators can quickly provision and de- provision user access privileges in accord with business processes, projects and objectives -- Risk Reduction -- Visibility, logging and reporting reduce the risk of human error when managing access rights"This additional functionality represents the latest significant upgrade to our TNS platform," said Rohati CEO Shane Buckley. "Preventing exposure to risk through unauthorized access and usage of unstructured data has, up to now, been a hard and expensive problem to fix. We have introduced a disruptive approach to solving this problem with very attractive economics." Unstructured Data access management is now available to TNS customers like JDSU, which have been successfully utilizing the TNS to enable granular access management to the broad range of applications deployed in its corporate data centers. With this new functionality, TNS customers can manage access for HTTP, HTTPS, CIFS, Microsoft SharePoint and TCP/IP client server applications. About Rohati Rohati Systems, Inc. is the leader in agent-less access management solutions. Rohati solutions quickly and cost-effectively enable companies to define, enforce and log access & authorization policies across applications and file shares from a single management console. Unlike traditional approaches to identity and access management that are time- and cost-prohibitive to deploy broadly, the Rohati solution resides in the data center, is network-based to ensure high performance, and does not require agents nor changes to applications. Delivering numerous industry firsts, Rohati enables companies to safeguard all their data assets to protect their business and comply with compliance regulations. Rohati is backed by Matrix Partners and Foundation Capital, and is headquartered in Sunnyvale, California. To learn more, visit www.rohati.com.
Rohati Releases Access Management Solution for Unstructured Data, Providing Powerful Discovery, Enforcement and Logging Capabilities That Can Be Rapidly and Cost-Effectively Deployed to Secure Unlimited Numbers of File Servers
JDSU Deployment Proves Rohati's Cost-Effective and Rapid Deployment to Ensure Security Policies and Compliance Mandates Are Enforced and Monitored
| Source: Rohati Systems, Inc.
SUNNYVALE, CA--(Marketwire - December 17, 2008) - Rohati Systems, Inc., the leading supplier of
agent-less access management solutions, today announced that its
award-winning Transaction Networking System™ (TNS™) now provides
cost-effective, easy-to-deploy access management and monitoring services
for unstructured data stored on file shares based on the Common Internet
File Shares (CIFS) protocol. This new capability enables effective data
security and compliance for unstructured data and file shares accessed by
employees, partners and customers to support collaboration needs.
"We have deployed the Rohati solution to help ensure that our security
policies are in compliance with ITAR (International Trade in Arms
Regulations) export controls," said Bill Turner, Chief Security Officer at
JDSU. "Rohati provides us with end user and transaction controls across our
unstructured data and file share infrastructure to ensure we are enforcing
and monitoring compliance controls and reducing the risk of unauthorized
access. The centralized, 'no-touch to the application' approach has enabled
a very rapid and cost-effective deployment when compared to the
alternatives."
Global enterprises are rapidly deploying CIFS to store data and enable
employees, partners, customers and other collaborators to quickly share
information over the Internet in support of business objectives. Until
today, security and compliance for CIFS has lagged far behind deployment,
as traditional security solutions require IT to devote massive amounts of
resources to the complex and time-consuming practice of custom coding
applications. Unlike traditional solutions though, the TNS utilizes
multiple attributes providing the 'who,' 'what,' 'when,' 'where' and 'how'
intelligence to quickly, easily and cost-effectively provide security and
compliance controls by enforcing granular access management policies at the
transaction level, eliminating the need to custom code applications or
locally configure each file server.
Commented The 451 Group Senior Analyst Steve Coplan, "Rohati has built a
technically elegant product to address a well understood business problem
-- balancing security with access and policy enforcement with agility,
using identity, context and application attributes constructs for
definition, enforcement and logging."
In addition to granular policy enforcement, TNS provides: