ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.

Slides:



Advertisements
Similar presentations
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
Advertisements

Bring Your Own Service The Effects of Cloud Services on Compliance and Data Protection © 2012 Varonis Systems. Proprietary and confidential.
The Effects of Cloud Services on Compliance and Data Protection
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Information Systems Security Officer
Controls for Information Security
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
An Introduction to AlarmInsight
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
VARONIS OVERVIEW DATA GOVERNANCE & SECURE FILE SHARING JUNE 5, 2013 Presented By: Dietrich Benjes VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
12 NYCRR PART PUBLIC EMPLOYER WORKPLACE VIOLENCE PREVENTION PROGRAMS.
About Safend ► Venture capital backed by: ► Experienced management team ► Top talent researchers and security experts ► Customers in the forefront of security.
Protection from internal threats: Evolution of DLP or Who sets trends.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
If BIG DATA is the answer, then what was the question?
What is FORENSICS? Why do we need Network Forensics?
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Introducing Paperless Bill Management and Accounts Receivable Processing.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Eliminating Data Security Threats.
Change and Patch Management Controls
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Security and the Questions Business Users should be asking the Techies.
2015 Security Conference Dietrich Benjes VP UK, Ireland & Middle East.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Understand Audit Policies LESSON Security Fundamentals.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
#SINET Connection Mike Fleck Co-founder Simple, transparent data security at the web tier.
Incident Response Christian Seifert IMT st October 2007.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Protect your Digital Enterprise
Cisco Compliance Management and Configuration Service
Design for Security Pepper.
Finding the top users of bandwidth on your network
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Varonis Overview.
How to Operationalize Big Data Security Analytics
cyberopsalliance.com |
Searchable. Secure. Simple.
County HIPAA Review All Rights Reserved 2002.
Chapter 27 Security Engineering
Information Social Access Mapping: Who is doing what with data?
Designing IIS Security (IIS – Internet Information Service)
Microsoft Data Insights Summit
Leading financial services provider
STEALTHbits Technologies, Inc.
SysKit Security Manager
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.

ABOUT VARONIS Founded in 2004, started operations in 2005 Over 1800 Customers Over 4500 installations Offices on 6 continents Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their unstructured data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged. VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

Data? What data? Varonis Systems. Proprietary and confidential.

650% growth in the next 5 years! UNSTRUCTURED DATA Varonis Systems. Proprietary and confidential. PERCENTAGE OF THE DIGITAL UNIVERSE Security-IntenseCompliance- Intense Preservation- Intense 0% 10% 20% 30% 40% 50% Source: IDC

Can IT answer? Who has access to this folder? Which folders does this user or group have access to? Who has been accessing this folder? Which data is sensitive? Who is the data owner? Where is my sensitive data overexposed? How do I fix it? Where do I begin? DATA EXPLOSION – ARE WE READY? 91% Lack processes for determining data ownership 76% Unable to determine who can access unstructured data Varonis Systems. Proprietary and confidential. + Data + Collaboration + Cross-Functional Teams + Security Requirements = MORE Containers MORE ACLs MORE Management SOURCE: PONEMON INSTITUTE MORE

SURVEY: 22% REPORTED A DATA BREACH Varonis Systems. Proprietary and confidential.

$7.2 MILLION PER BREACH Varonis Systems. Proprietary and confidential.

43% OF BREACHES BY “TRUSTED” INSIDERS Varonis Systems. Proprietary and confidential.

SECURE COLLABORATION MAXIMIZES VALUE Varonis Systems. Proprietary and confidential. Too much access Uncontrolled Collaboration No Access No Collaboration Maximum Value Negative Value (Damage) Correct Access Correct Auditing No Value

So, how do we protect our data? Varonis Systems. Proprietary and confidential.

DATA PROTECTION FLOW Authentication Users are who they say they are Authorization Users have access to only what they need Auditing Monitor actual access Alert On unusual activity Varonis Systems. Proprietary and confidential. Authenticati on Authorizatio n Auditing ALERT!

IF WE DO THAT… Access is controlled No one gets access to data who shouldn’t No data is exposed to people that shouldn’t see it Access is monitored No one can access data without it being logged Logs are inspected (with automation) Unusual activity is flagged Humans can investigate the right things Varonis Systems. Proprietary and confidential.

What might this look like? Varonis Systems. Proprietary and confidential.

PERMISSIONS - BI-DIRECTIONAL VISIBILITY Varonis Systems. Proprietary and confidential.

AUDIT TRAIL Varonis Systems. Proprietary and confidential.

QUOTE FROM A CSO ON DLP “Yesterday I had one problem: where’s my sensitive data? Today I have 193,000 problems.” Varonis Systems. Proprietary and confidential.

ACTIONABLE DATA Varonis Systems. Proprietary and confidential. Sensitive Data Exposed Data Prioritized list of folders that should be addressed Top folders that contain a large percentage of sensitive data -AND- Have excessive/loose permissions Prioritized list of folders that should be addressed Top folders that contain a large percentage of sensitive data -AND- Have excessive/loose permissions

ACTIVITY ANALYSIS Varonis Systems. Proprietary and confidential. Most/Least Active Users Most/Least Active Directories Anomalous Behavior Most/Least Active Users Most/Least Active Directories Anomalous Behavior

RECOMMENDATIONS AND MODELING Varonis Systems. Proprietary and confidential.

HBR ON DATA OWNERS Varonis Systems. Proprietary and confidential. You don't manage people assets the same way you manage capital assets. Nor should you manage data assets in the same way you manage technology assets. This may be the most fundamental reason for moving responsibility for data out of IT.

DATA OWNERSHIP IDENTIFICATION Varonis Systems. Proprietary and confidential. Active Users

REPORTS – AUTOMATIC FOR OWNERS Varonis Systems. Proprietary and confidential. Permissions Activity

IMPROVING DATA SECURITY WITH AUTOMATION Data is accessible to only the right users Access is reviewed regularly Owners will be identified based on metadata, assigned, tracked & involved Permissions reports will be created and sent automatically User access is audited continuously User access is analyzed automatically Unused data is automatically moved or deleted Varonis Systems. Proprietary and confidential.

REDUCED RISK, BETTER PROCESS Varonis Systems. Proprietary and confidential. Trust Access is restrictedAccess is restricted Data owners identifiedData owners identified Owners Review AccessOwners Review AccessVerify Access AuditedAccess Audited Usage analyzedUsage analyzed Less will arrive at endpointsLess will arrive at endpoints

Free 30 day trial! Assess your company’s data security threats. Varonis Systems. Proprietary and confidential.