Analysing and Classifying Data at Rest

Slides:



Advertisements
Similar presentations
Which server is right for you? Get in Contact with us
Advertisements

General Business Secure Information Sharing in SharePoint 2010 Antonio Maio Senior Product Manager, Titus Inc.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Document Management Systems For Government Agencies Infocrew Solutions Pvt Ltd.
Working with SharePoint Document Libraries. What are document libraries? Document libraries are collections of files that you can share with team members.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Challenges Emerging Technologies present for Information Managers Allegra Huxtable Manager Government Information Strategy Unit Tasmanian Archive and Heritage.
ControlPoint The Eleventh Hour Presentation and ControlPoint Demonstration Abdullah Noman October, 2015.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
One Drive for Business: More Than a File Share Erica Toelle
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Robert Lejnert HPE Information Management & Governance, CEE.
The Content Intelligence Company
Agenda Compliance Vision About Data Governance Demo
92% of the world’s data was created in the past 2 years
Getting Started with Chatter
Hybrid Taxonomy & Hybrid Content Types
Taming the Wild Unstructured Data: The Shared Drive Jungle
Protect sensitive information with Office 365 DLP
Identity Driven Security
Scotland’s Environment Web Environmental Data Portal Joanna Muse Scottish Environment Protection Agency.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Data Loss Prevention in O365:The Basics
My First Template.
Prevent Costly Data Leaks from Microsoft Office 365
Introduction to Soonr by ….
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Storage & Digital Asset Management CIO Council Update
Threat Landscape for Data Security
Varonis Overview.
All data occupies physical space, even if we don't think of it as such.
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Protect your OneDrive and SharePoint files on mobile devices
Voice Analytics on Microsoft Azure Allows Various Customers to Get the Most Out of Conversations with Clients Through Efficient Content Analysis MICROSOFT.
Data Security for Microsoft Azure
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Top 10 Tips for GDPR Compliance in Office 365
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
TruRating: Mass Point-of-Payment Customer Rating System Uses the Power of Microsoft Azure to Store and Analyze Millions of Ratings for Business Owners.
Managing Content: You Need To Think About More Than Office 365
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
Getting Started with UCSF Chatter
Information Social Access Mapping: Who is doing what with data?
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Using the Cloud App Marketplace Monitoring cloud app migrations
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
OneDrive for Business: Administration, Security and Compliance
Journey to the Cloud – Guidance and Lessons Learned
Executive visibility to critical business assets
Dark Data Are we at risk?.
Outlook and Shared Drives
Hello, Minnesota! This is the SPC18 recap.
Business-class solution
Protect data in core business applications
COMPANY PROFILE: REELWAY
Change. For the Better After 14 January 2020, Microsoft will no longer provide security updates or support for Windows 7. But you can keep the good times.
Make it real: Help your customers comply with the GDPR
Microsoft Data Insights Summit
Data Lost Prevention (DLP) © Copyright 2009 Technica All rights reserved. No part of this presentation in all its property may be used or reproduced in.
Comodo Dome Data Protection
10/2/ :13 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
GDPR is here – are you ready?
Presentation transcript:

Analysing and Classifying Data at Rest Simon Carlson 2 September, 2016

Security and risk (S&R) pros can’t expect to adequately protect data if they don’t have knowledge about what data exists, where it resides, how valuable it is to the firm, and who can use it. March 2016 Rethinking Data Discovery and Data Classification Strategies

Today’s Organization No longer is data isolated to a few users or even within four walls. We create it, upload it, share it, download it, and we send it to other users around the globe and to partners. 90% of world’s data created within last few years Storage options increasing, costs to store decreasing Ever increasing need to collaborate, across the office and across the world More data being created, stored and shared By people By machines

Today’s Data Add to the complexity of all that data being created the fact it’s not only your people creating data. <BUILD> You also have system generated content. How can you make sure that these files are protected if your users aren’t even involved in their creation? Additionally, wouldn’t you like to know something about the sensitivity of the files being created by your various systems? <BUILD> This may be reports being generated out of Salesforce, Drawings out of SAP, you name it.

The Databerg Problem 14% Business Critical 46% 32% R.O.T. Identified 32% R.O.T. 54% Dark Data Use the example of lawsuits – many organizations are now choosing to settle rather than go through with e-Discovery, as the task is far too daunting, and would require too many resources (people and $$) to

“Everything here is my most important thing!” Data Hording “Everything here is my most important thing!”

Classify data in use Custom Metadata

Scan Data at Rest Identify What, where, who? Scan Content Protect Sensitive Data Classify with Metadata Discover & Identify Data at Rest Analyze Data Sensitivity Identify What, where, who? Scan Content Identify PCI, PII, PHI, scan for Intellectual Property <BUILD> Classify Bulk classify data assets Classify based on that PCI, PII, PHI, IP <BUILD> Protect Protect through applying RMS/encryption Other means of “protection” via quarantining, moving, marking the files, etc. <BUILD> Analyze As Illuminate is performing its scans, it collects information about the files that you can later analyze and report against

Identify Dark Data Owner Sensitivity Location Zac Smith PII Human Resources/Updates Jane Doe PCI Finance/Collections PHI So how do we answer those concerns? Through data discovery and subsequent analysis. Discover, Classify, Protect, and Analyze your data

Reduce Data Liability Eliminate Redundant, Obsolete, Trivial (ROT) Image needs updating to TITUS format…

Identification Before Migration Metadata Policy Border Classification / CASB / DLP Starting with Data Identification and classification, you can make educated decisions on what to move to the cloud. Additionally, given that Illuminate embeds the classification metadata, migration tools can read the information and only move the appropriate files. Maybe you want to start with public files, and go from there? Maybe you’re comfortable with all but the most highly sensitive data being stored in the cloud? Use Illuminate to identify all your data, and feel confident about what you’re migrating to the cloud.

Discover, Classify, Protect Discover files anywhere Identify sensitivity Classify Embed metadata Protect where appropriate Box Dropbox OneDrive SharePoint Cloud On Premise Let’s start with your on-premise files, your: Network File Shares SharePoint On Premise WHAT is my data? WHERE is my data?

Data Discovery Risk of Breach Data Awareness Data Liability Cloud Storage Risks Data ROT Data Awareness