Reducing Cost and Risk During an Investigation

Slides:



Advertisements
Similar presentations
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
Advertisements

No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Enterprise Content Management Identifying and Addressing New Areas of Cost Reduction How to use this PowerPoint template: 1.Insert these slides onto your.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Surviving eDiscovery: Technology Firm Perspective  Robert A. Cruz Sr. Director, eDiscovery Solutions, Proofpoint, Inc.
‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
OFFICE 365 APP BUILDER PROFILE: Druva
10/16/2017 7:22 AM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Leverage the Cloud to Minimize the Impact of Ransomware
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Office 365 is cloud-based productivity, hosted by Microsoft.
Fusion Center ITS security and Privacy Operations Joe Thomas
Company Bundesdruckerei GmbH Headquarters Berlin Industry High tech
Comprehensive Security and Compliance at an Affordable Price.
Reducing Cost and Risk During an Investigation
92% of the world’s data was created in the past 2 years
Vikas Uberoy -Channel Director ANZ
Hybrid Management and Security
Customized Solutions to your needs
Remote Collection What, When & Why.
MyQuorum Customer Activity Export Add-In Streamlines Excel Analysis, Gives Users Direct Access to Transaction Data, Improves Security OFFICE APP BUILDER.
Leveraging Cloud Technology to Reduce Cost and Risk in E-Discovery
Electronic Records Management Program
CompareDocs cloud Makes it Immediately Clear What has Changed Between Document Versions, on any Windows 10-Compatible PC or Device WINDOWS APP BUILDER.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Speaker’s Name, SAP Month 00, 2017
Make Better and Quicker Decisions by Providing Additional Context with the myQuorum Pipeline Notification Details Add-In for Microsoft Outlook OFFICE APP.
Securing Your Digital Transformation
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Easy TMF Introduction & Demo for QED Clinical Services
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
TES Data Platform Providing business users with the tools to connect share and analyse data 2018.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
The MobileIron® Threat Detection difference:
GRC - A Strategic Approach
IUC Records Retention Tool: Zasio’s Versatile Retention
Microsoft Data Insights Summit
Capitalize on Your Business’s Technology
Microsoft Data Insights Summit
Introduction to Digital Forensics
Presentation transcript:

Reducing Cost and Risk During an Investigation John Massengale, AccessData Doug Cordero, Druva

Corporate Investigation Trends Companies are conducting digital investigations on at least a weekly basis for a variety of purposes... 52% Ensuring compliance (keeping information systems, applications, devices, processes and procedures in compliance with industry-specific, privacy and other business regulatory mandates) 52% Data security (keeping customer, financial, intellectual property, personally identifiable information and legal information safe from breach) 43% Responding to incidents (shortening the gap between the time of compromise and the time to discovery of cyber breaches or internal incidents) 32% Managing internal investigations (investigating complaints about discrimination, harassment or misuse of corporate computers, corporate intellectual property theft, employee embezzlement and financial crimes, etc.) 27% Managing e-discovery (preparing for litigation discussions) Source: 2016 IDG Market Research Study

Corporate Investigation Trends

Corporate Investigation Trends Source: 2016 IDG Market Research Study

Current Digital Landscape Average laptop hard drive = 500 GBs to 1 TB Average desktop hard drive = 1 TB + A single user receives an average of 150 emails a day, 3,600 a month and over 43,000 a year. Smartphones can hold 64 to 500 GBs of data. The average adult sends and/or receives 85 text messages a day, 2,550 a month and over 30,000 per year. A single thumb drive, smaller than the tip of a finger, can hold 256 GBs. The average person has 5.5 social media accounts that vary between 30 to 100s of messages daily, depending on platform.

Corporate Investigation Trends

User Scenario: Insider Threat Investigation Negligent employee uploads customer PII to Box. Customer information is compromised and it’s been traced back to your company. Customers are suing for damages. CEO wants answers: how did this happen who is responsible, is there any remaining threat? The challenge: Identifying the perpetrator. Investigating discreetly to not alert employees. Containing the threat and remediating identified risks. Keeping all teams involved.

User Scenario: Insider Threat Investigation Solution: Gain visibility across endpoints: leverage tools that deploy agents to each endpoint and seamlessly connect to data repositories and cloud platforms. Covert investigation: look for software that runs “behind the scenes” to avoid alerting employees or disrupting business operations. Solutions should also pause when offline and resume when employees log back in to the network, picking up where they left off. Remediation: delete offending files or processes. Collaboration: integrated tools that can easily be used by all departments involved without moving data between platforms and teams. Benefits: Improved data visibility Cut down on risk of future threats Speed investigations Improved collaboration

Reduce risk of data loss/spoliation Single platform to proactively collect data meets legal forensic requirements Automated legal holds, data preservation and chain of custody tracking and reporting Search and cull data to reduce downstream e-discovery costs High-speed processing and review

User Scenario: E-Discovery Investigation Customers whose data was compromised suing for damages. Legal team needs access to data used in the internal investigation/launching e-discovery investigation. The challenge: Need to move quickly to minimize brand damage if word gets out your company suffered a breach. Need to easily share the data between HR, Legal and IT. Need to minimize cost.

User Scenario: E-Discovery Investigation Solution: Leverage an integrated solution: data never has to be processed and reprocessed, or moved between platforms. Forensically sound: preserve ESI in a forensically sound manner to ensure data is not lost or corrupted, which could jeopardize your case. Collect from the cloud: data connectors enable seamless transfer of data from platforms otherwise challenging to collect from in an investigation. Collaboration: ensure all teams are collaborating and up to speed in an efficient way. Benefits: Reduced cost Reduced risk Improved collaboration Repeatable, defensible process

Complicated, Manual and Expensive Streamlined E-Discovery Workflow Complicated, Manual and Expensive

What’s the Solution? Leverage an e-discovery solution in combination with compliance/archiving solutions to speed up the process, thus cutting e-discovery costs.

Benefits of a Streamlined Approach Significantly lower costs Eliminate manual processes Save time Reduce ROT (Redundant, Obsolete, Trivial) data with pre- ingestion culling

Summary With the joint solution from Druva and AccessData to manage investigations, you benefit from: Improved efficiency and collaboration Accelerated digital investigations Reduced cost Minimize spoliation risk and ensure your data remains protected

Thank you! Questions? For a demo of how Druva and AccessData can be used together to improve overall investigation efficiency, stop by our booth. John Massengale, AccessData jmassengale@accessdata.com Doug Cordero, Druva doug.cordero@druva.com