1 / 24

Eliminating Data Security Threats

Eliminating Data Security Threats. About varonis. Founded in 2004 , started operations in 2005 Over 2000 Customers

verne
Télécharger la présentation

Eliminating Data Security Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Eliminating Data Security Threats Varonis Systems. Proprietary and confidential.

  2. About varonis • Founded in 2004, started operations in 2005 • Over 2000 Customers Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their unstructured data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged. Varonis Systems. Proprietary and confidential.

  3. Data? What data? Varonis Systems. Proprietary and confidential.

  4. BIG Data Trends By 2020,data centers will manage: • 14x Data • 10x Servers • with 1.5x IT Staff Organizations are responsible for protecting 80% ofalldata Opportunity to extractmore value through tagging& analysis (Big Data) Source: IDC Digital Universe

  5. Data Explosion – Are We Ready? 91%Lack processes for determining data ownership 76%Unable to determine who can access unstructured data • Can IT answer? • Who has access to this folder? • Which folders does this user or group have access to? • Who has been accessing this folder? • Which data is sensitive? • Who is the data owner? • Where is my sensitive data overexposed? • How do I fix it? • Where do I begin? MORE + Data + Collaboration + Cross-Functional Teams +Security Requirements = MORE Containers MORE ACLs MORE Management SOURCE: PONEMON INSTITUTE Varonis Systems. Proprietary and confidential.

  6. Survey: 22% reported a data breach Varonis Systems. Proprietary and confidential.

  7. $7.2 million per breach Varonis Systems. Proprietary and confidential.

  8. Secure Collaboration Maximizes Value Maximum Value Too much access Uncontrolled Collaboration No Access No Collaboration Correct Access Correct Auditing No Value Negative Value (Damage) Varonis Systems. Proprietary and confidential.

  9. So, how do we protect our data? Varonis Systems. Proprietary and confidential.

  10. Data Protection Flow • Authentication • Users are who they say they are • Authorization • Users have access to only what they need • Auditing • Monitor actual access • Alert • On unusual activity • Authentication • Authorization • Auditing ALERT! Varonis Systems. Proprietary and confidential.

  11. If we do that… • Access is controlled • No one gets access to data who shouldn’t • No data is exposed to people that shouldn’t see it • Access is monitored • No one can access data without it being logged • Logs are inspected (with automation) • Unusual activity is flagged • Humans can investigate the right things Varonis Systems. Proprietary and confidential.

  12. What might this look like? Varonis Systems. Proprietary and confidential.

  13. Permissions - Bi-Directional Visibility Varonis Systems. Proprietary and confidential.

  14. Audit Trail Varonis Systems. Proprietary and confidential.

  15. Quote from a CSO on DLP “Yesterday I had one problem: where’s my sensitive data? Today I have 193,000 problems.” Varonis Systems. Proprietary and confidential.

  16. Actionable Data Exposed Data Sensitive Data • Prioritized list of folders that should be addressed • Top folders that contain a large percentage of sensitive data -AND- • Have excessive/loose permissions Varonis Systems. Proprietary and confidential.

  17. Activity Analysis • Most/Least Active Users • Most/Least Active Directories • Anomalous Behavior Varonis Systems. Proprietary and confidential.

  18. Recommendations and modeling Varonis Systems. Proprietary and confidential.

  19. Data Ownership Identification Active Users Varonis Systems. Proprietary and confidential.

  20. Reports – Automatic for Owners Activity Permissions Varonis Systems. Proprietary and confidential.

  21. Automate Entitlement Reviews

  22. DatAnywhere: Your Own Cloud

  23. Improving data security with Automation • Data is accessible to only the right users • Access is reviewed regularly • Owners will be identified based on metadata, assigned, tracked & involved • Permissions reports will be created and sent automatically • User access is audited continuously • User access is analyzed automatically • Unused data is automatically moved or deleted Varonis Systems. Proprietary and confidential.

  24. Free 30 day trial! Assess your company’s data security threats. Varonis Systems. Proprietary and confidential.

More Related