Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Copyright © 2006 Quest Software Quest SharePoint Management.
For Developers Who Hate SharePoint.  ~5 years web development experience  1 ½ years SharePoint experience  First worked with SharePoint in Dec. 2006,
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Extending IBM Security Identity Manager
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
Developing a Culture of Information Management You’ve selected your ECM solution – Now what? Paul Bauman TOWER Software December 13, 2006.
Extending IBM Security Identity Manager
General Business Secure Information Sharing in SharePoint 2010 Antonio Maio Senior Product Manager, Titus Inc.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Welcome Windows SharePoint Service 3.0. Craig Carpenter MCSE, MCT Director, Combined Knowledge.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
PRINTING IN THE DISTRIBUTED ENVIRONMENT When Mobile Matters Tricerat, Inc All rights reserved.
ORACLE DATABASE SECURITY
ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | OFSAAAI: Modeling Platform Enterprise R Modeling Platform Gagan Deep Singh Director.
Corporate Efficiency Meeting Improving Your Business Processes Using SharePoint and Beyond.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
A Governance-based Approach to Identity Management
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
VARONIS OVERVIEW DATA GOVERNANCE & SECURE FILE SHARING JUNE 5, 2013 Presented By: Dietrich Benjes VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Project 2003 Presentation Ben Howard 15 th July 2003.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Security and the Questions Business Users should be asking the Techies.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
PARTNER CAMPAIGN PACK  2015 ObserveIT Campaign Roadmap  Introducing ObserveIT Partner Campaign Packs  Overview of Application User Campaign Pack.
Comprehensive Project Management Solutions with the.NET Server family.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Understand Audit Policies LESSON Security Fundamentals.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
SharePoint Governance And the role of the Site Owner.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager
7 The Tenets of IAM Put Identity Management at the Center of Your Security Strategy Doug MacPherson, CISSP .
Building A Security Program From The Ground Up
StealthAUDIT For Access & Data Governance.
Cisco Data Virtualization
SaaS Application Deep Dive
Power BI Security Best Practices
Creating Novell Portal Services Gadgets: An Architectural Overview
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Multi-Farm, Cross-Continent SharePoint Architecture
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Information Social Access Mapping: Who is doing what with data?
A 5-minute overview of ADAudit Plus
Agenda The current Windows XP and Windows XP Desktop situation
Quality & Risk Management
Impact Of A Security Breach
Partner Facing Demo.
STEALTHbits Technologies, Inc.
Presentation transcript:

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Who is STEALTHbits? 2 For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. |3 Premier Customers Technology Partners

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Agenda What is Unstructured Data? Why should Unstructured Data be at the top of your list of security concerns? What challenges are you going to face in trying to secure your Unstructured Data? What can you do today to begin mitigating your risk? What should you be thinking about tomorrow to control access to Unstructured Data permanently?

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What is Unstructured Data? Technically Speaking – Data that lacks a defined structure, unlike structured data that fits into the traditional database row and column paradigm Non-Technical Translation – “Human-generated” Data – Documents, Spreadsheets, Presentations, and other data types that reside on File Shares, in Collaboration Portals (i.e. SharePoint) on Desktops and Servers White Paper Download ‘Getting Unstructured Data Under Control for Security & Compliance’ -Randy Franklin Smith unstructured-data-under-control-white-paper

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Challenges Understanding risk exposed by insider access to data Establishing business data ownership to ensure proper access oversight Gaining full insight to how access is granted to all organizational data Impacts Rogue Barclays employee uses access to defunct line of business data to sell customer info for profit Hospital employee accesses hundreds of patient records even though they weren’t under their care Improperly configured access leads to massive data breach

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Know 80% of an organization’s data is unstructured (dark data) There is a lot of it 650% growth predicted in next 5 years It is growing fastSecurity is critical % of that data is sensitive

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Don’t Know Ownership – 91% of organizations lack a process to determine data ownership Who has access to what? – 76% of organizations are unable to determine who has access to their data The Risk – Audit & Regulatory Fines SOX/PCI/MAS – Sensitive Data Leakage Brand damage – Inability to Execute IAM / IAG DLP

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Access Today Windows File Systems EMC/Isilon & NetApp NAS SharePoint NFS & UNIX Active Directory & LDAP NIS Local Users & Groups SharePoint Windows File Systems EMC/Isilon & NetApp NAS Local Users & Groups NFS & UNIX SharePoint Admins AD Admins UNIX Admins Helpdesk Admins Business Data Owners? Access has grown organically with the infrastructure Granting access is a matrix operation No one knows the whole story

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What has IAM done for Unstructured Data? Focus on applications – Connectors are king With unstructured data, there is nowhere to connect – Scale of the problem too large – Too many file stores IAM HRERPData?CRM

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What can you do today? Discover where Unstructured Data Exists – Close the door on Open Access Open Access Remediation (File Shares & SharePoint Sites) Identify your Local Administrators and recertify their access Clean-up your Mess – Active Directory Clean-up Stale Groups, Users, Computers Toxic Conditions (Circular, Deep-level, Improper Nesting) Attribute Incompleteness Find the data that poses the greatest risk – Sensitive Data Discovery Compliance data, PII (Customer and Employee data), Trade Secrets, etc.

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What should you be thinking about tomorrow? Understand where Active Directory Groups have access – Determine whether or not they still need access – Transform your Security Model (Resource-based Groups) – Assign Owners/Data Custodians Put a Data Access Governance Program in place – Integrate Unstructured Data with Identity & Access Management platforms – Perform regular Entitlement Reviews – Implement Self-Service Access Requests Monitor Activity – Understand how access is changing and who is accessing the data – Track Anomalies and/or Suspicious Activity

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. |  Request a Trial o  Learn More o  Ask Us a Question o  Attend a Demo o