STEALTHbits Technologies, Inc.

Slides:



Advertisements
Similar presentations
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
USER ACTIVITY MONITORING: YOUR MISSING SECURITY VANTAGE POINT Presented by Matt Zanderigo.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Extending IBM Security Identity Manager
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.
Chapter 7 Database Auditing Models
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Eliminating Data Security Threats.
Security and the Questions Business Users should be asking the Techies.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
TransArmorSM A Secure Transaction ManagementSM Solution
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
PARTNER CAMPAIGN PACK  2015 ObserveIT Campaign Roadmap  Introducing ObserveIT Partner Campaign Packs  Overview of Application User Campaign Pack.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Safe’n’Sec IT security solutions for enterprises of any size.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Protect your Digital Enterprise
Maciej Pęciak Robert Dąbroś
The time to address enterprise mobility is now
Deployment Planning Services
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Enterprise Mobility Suite Technical and Business Briefing
Cloud Firewall.
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Do you know who your employees are sharing their credentials with
Identity & Access Management for a cloud-first, mobile-first world
Data Center Firewall.
Journey to Microsoft Secure Cloud
SaaS Application Deep Dive
Understanding best practices in classifying sensitive data
Forensics Week 11.
Information Security: Risk Management or Business Enablement?
Making Information Security Manageable with GRC
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Varonis Overview.
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PRIVILEGED ACCOUNT ABUSE
Panda Adaptive Defense Platform and Services
A 5-minute overview of ADAudit Plus
Protecting your data with Azure AD
BACHELOR’S THESIS DEFENSE
Predicting Insider Threats (PIT)™
Forensic and Investigative Accounting
BACHELOR’S THESIS DEFENSE
Computer Science and Engineering
Microsoft Data Insights Summit
7/28/ :33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Protect data in core business applications
Microsoft Data Insights Summit
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

STEALTHbits Technologies, Inc. Corporate Overview STEALTHbits Technologies, Inc.

About STEALTHbits STEALTHbits is a data security software company. We secure an organization’s information by defending against credential abuse and controlling access to data.

STEALTHbits At a Glance 40% of the Fortune 100 50% Growth Year Over Year 5 of 6 Largest Financials Consistently Profitable An established, profitable company Founded in 2001 96% Customer Retention 14 Years of Growth 65% R&D Utilities, Financials, Healthcare, Retail, Education Operations in 7 Countries Identify Threats. Secure Data. Reduce Risk.

Premier Customers Technology Partners Working with the best organizations in the world, best technology partners in the world Technology Partners

Every Major Breach Involves Credential Abuse $400MM – The estimated financial loss from 700 million compromised records. Verizon 2015 Data Breach Investigations Report The average number of days it takes to detect a breach is 200 to 230. "Sony Hacking Fallout Puts All Companies on Alert“, Associated Press, Dec 18, 2014 55% of breaches involve malicious insiders abusing their access. 57% of breaches involve the theft of unstructured data. “Survey on the Governance of Unstructured Data”, Ponemon Institute This is 3rd Party support for the problem Breaches are a big, expensive problem They take a long time to discover, only adding to the damage and adding to the cost And every headline-grabbing breach of late has involved credential theft and abuse - Sony, Target, Home Depot, Snowden, Ashley Madison, IRS, Press Release – And the whole reason people steal and abuse credentials is to get at data. Unstructured data is and will always be a target of breaches. A new report from the Ponemon Institute found that only 23 percent of its survey respondents felt their companies' unstructured data was properly secured. The institute polled 870 IT professionals, where 84 percent said that too many workers are able to access critical corporate information as unstructured data. In addition, the survey found that almost 76 percent of companies have no process to control employee access to unstructured data. Experton Group believes it will be difficult to automatically protect all unstructured data, since it is difficult, if not impossible, to determine the importance of unstructured data when it is created. Unstructured data includes information in email, instant messages, published documents, and spreadsheets. Twenty-six percent of respondents said they are confident in their ability to always detect a data breach involving structured data, while only 12% are as confident if the breach involves unstructured data. The State of Data Centric Security, Ponemon Institute

The STEALTHbits Solution A Three-Pronged Approach to Data Security “I need to know who has access to data and how they’re using it.” “I need to monitor and control changes and access in my environment.” “I need to know when bad actors are trying to access my data so I can stop them.” Change & Access Monitoring Threat & Intrusion Detection Data Access Governance

STEALTHbits Product Portfolio Coming Soon! Auditing, compliance, and governance platform for unstructured data Change and access monitoring platform with real-time alerting Purpose-built user behavior analytics and threat detection solution

StealthAUDIT Management Platform Find and Control Access to Unstructured Data What does it do? Gathers and analyzes data from on premise and cloud based systems and applications to answer critical Data Access Governance questions: Who has access to what data? How do they have access to the data? What level of access do they have to the data? Where is sensitive data? Who owns the data? Use Cases Open Access Remediation Sensitive Data Discovery File Activity Monitoring Active Directory Cleanup Data Ownership Identification Governance – Ownership Assignment, Entitlement Reviews, and Self-Service Access Requests Differentiators Speed & Scalability Small Footprint & Agentless Data Collection Flexibility Interoperability with IAM solutions In the corporate overview deck, we give a high level overview of the whole platform. Focus on DAG because that’s where our bread and butter has been. But you most likely won’t pitch the entire platform, you’ll focus on one of the use cases. If you need more detail, move to the SA-specific deck. At the end of the day, everything we do is about understanding and controlling access to unstructured data. Scalability – Agentless, low-profile architecture allows us to scale to the largest environments in the world Flexibility – Data is stored in SQL database, allowing for maximum flexibility in analysis and easy integration with other products Data Collection – Scope and speed of our data collection is unmatched in the market

StealthINTERCEPT What does it do? Use Cases Differentiators Monitor and Alert on Changes and Access Within the Microsoft Infrastructure What does it do? Monitors, alerts on, and blocks hazardous changes and access to Active Directory, file systems, and Microsoft Exchange: Sensitive Active Directory Groups Critical GPOs and AD Settings File Permissions and Access Critical Mailboxes Use Cases Modifications of AD objects and Group Policy Objects (GPOs) Suspicious activity and access modifications to sensitive data Non-owner mailbox access events and permission changes Differentiators No reliance on native logs Authentication-based attack analytics Integration with all leading SIEM solutions

Purpose-Built UBA for Credential Theft and Abuse StealthDEFEND Coming Soon! Purpose-Built UBA for Credential Theft and Abuse What does it do? Detects and disables compromised and abused accounts. User Behavior Analytics Machine Learning Access Auditing & Sensitive Data Discovery Use Cases Authentication-Based Attacks Privileged Account Abuse Malicious Insiders Ransomware/Malware Differentiators Purpose-built UBA solution Focused on Active Directory credential theft or abuse SIEM Integration Account Blocking

Fulfill Compliance Requirements Why STEALTHbits Reduce Security Risk The Benefits Fulfill Compliance Requirements Reduce Operations Costs