We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAthena Rickett
Modified about 1 year ago
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Who is STEALTHbits? 2 For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. |3 Premier Customers Technology Partners
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Agenda What is Unstructured Data? Why should Unstructured Data be at the top of your list of security concerns? What challenges are you going to face in trying to secure your Unstructured Data? What can you do today to begin mitigating your risk? What should you be thinking about tomorrow to control access to Unstructured Data permanently?
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What is Unstructured Data? Technically Speaking – Data that lacks a defined structure, unlike structured data that fits into the traditional database row and column paradigm Non-Technical Translation – “Human-generated” Data – Documents, Spreadsheets, Presentations, and other data types that reside on File Shares, in Collaboration Portals (i.e. SharePoint) on Desktops and Servers White Paper Download ‘Getting Unstructured Data Under Control for Security & Compliance’ -Randy Franklin Smith unstructured-data-under-control-white-paper
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Challenges Understanding risk exposed by insider access to data Establishing business data ownership to ensure proper access oversight Gaining full insight to how access is granted to all organizational data Impacts Rogue Barclays employee uses access to defunct line of business data to sell customer info for profit Hospital employee accesses hundreds of patient records even though they weren’t under their care Improperly configured access leads to massive data breach
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Know 80% of an organization’s data is unstructured (dark data) There is a lot of it 650% growth predicted in next 5 years It is growing fastSecurity is critical % of that data is sensitive
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Don’t Know Ownership – 91% of organizations lack a process to determine data ownership Who has access to what? – 76% of organizations are unable to determine who has access to their data The Risk – Audit & Regulatory Fines SOX/PCI/MAS – Sensitive Data Leakage Brand damage – Inability to Execute IAM / IAG DLP
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Access Today Windows File Systems EMC/Isilon & NetApp NAS SharePoint NFS & UNIX Active Directory & LDAP NIS Local Users & Groups SharePoint Windows File Systems EMC/Isilon & NetApp NAS Local Users & Groups NFS & UNIX SharePoint Admins AD Admins UNIX Admins Helpdesk Admins Business Data Owners? Access has grown organically with the infrastructure Granting access is a matrix operation No one knows the whole story
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What has IAM done for Unstructured Data? Focus on applications – Connectors are king With unstructured data, there is nowhere to connect – Scale of the problem too large – Too many file stores IAM HRERPData?CRM
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What can you do today? Discover where Unstructured Data Exists – Close the door on Open Access Open Access Remediation (File Shares & SharePoint Sites) Identify your Local Administrators and recertify their access Clean-up your Mess – Active Directory Clean-up Stale Groups, Users, Computers Toxic Conditions (Circular, Deep-level, Improper Nesting) Attribute Incompleteness Find the data that poses the greatest risk – Sensitive Data Discovery Compliance data, PII (Customer and Employee data), Trade Secrets, etc.
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What should you be thinking about tomorrow? Understand where Active Directory Groups have access – Determine whether or not they still need access – Transform your Security Model (Resource-based Groups) – Assign Owners/Data Custodians Put a Data Access Governance Program in place – Integrate Unstructured Data with Identity & Access Management platforms – Perform regular Entitlement Reviews – Implement Self-Service Access Requests Monitor Activity – Understand how access is changing and who is accessing the data – Track Anomalies and/or Suspicious Activity
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Request a Trial o Learn More o Ask Us a Question o Attend a Demo o
Files Matter … to Users and Administrators. Files Matter … IT Directors and Administrators.
© 2011 Verdasys, Inc. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY - DO NOT REPRODUCE. Enterprise Information Protection When DLP is Not Enough? Graham.
Scalable Privileged Access Management Deployment experience of a global-scale privileged access management system at Bank of America. Identity and Access.
Scott Shearer SharePoint Evangelist/Developer FlexPoint Technology
Best Practices for Implementing An Information Solution By Even Brande.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
1 Monitoring and Evaluation What are we talking about? Module 5 Session 8.
IT Security Auditing. Topics Defining IT Audit Risk Analysis Internal Controls Steps of an IT Audit Preparing to be Audited Auditing IT Applications Who.
Slide Heading Data Security Risk Assessment David Fanson, CISA, MBA Practice Director, Technology Risk Titus December 12, 2012.
File Concept A file is a named collection of related information that is recorded on secondary storage. A file has a define structure, which we must know.
SharePoint Governance Questions January 2014 ©2014 SUSAN HANLEY LLC.
National Safety Compliance, Inc. …because safety is never an accident… Presentation works best if displayed on a computer with an active internet connection.
Exchange 2010 Hosting Service How Hosted Exchange Works and Benefits Businesses.
2006 Pacific Northwest Environmental Data Workshop Summary of Day 1, 2 and Next Steps Notes Nancy Tosta, Ross & Associates.
Best Practices to Deploy a Successful Portal Carol Penne – International Monetary Fund Zach Wahl – Project Performance Corporation March 18, 2005 Portal.
Anatomy of a HIPAA Breach Maureen DAgostino SVP, Quality, Service and Performance Excellence Colleen McClorey Associate General Counsel, University of.
1 Data Handling at Purdue. Section I The Importance of Data Security (slides 4 – 5) Laws and Policies (Slides 7 – 18) - Federal - State - Purdue Section.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice The Business Case for Configuration.
How the World Bank built an enterprise taxonomy -- a story with a happy ending Denise A. D. Bedford, Ph.D. Senior Information Officer World Bank ASIST.
Public Information Version 3.1: 1/1/2012 Introducing Instant Business Intelligence To IT BI Project Managers What you need, when you need it
Presenter name Presenter Organization Location and date Clinical Information Systems Adapted from Improving Chronic Illness Care
Chapter 8 E-Strategy, Internet Communities, and Global EC Prentice Hall, 2003.
MOSS ADAMS LLP | 1 W HAT I S S ENSITIVE D ATA ? Whats the Risk and What Do We Do About It? Weston Nelson Steve Fineberg Steven Gin.
IBM Software Group Tivoli Software from IBM Storage Data Protection Solution Seminar Tele-Rep Training Manual Internal Document Prepared by: Wunderman.
Intelligent Risk Management & Compliance Cost Reduction Creating a sustainable risk and compliance organization while reducing inefficiency and improving.
Data, Policy, Stakeholders, and Governance Amy Brooks, University of Michigan – Ann Arbor Bret Ingerman, Vassar College Copyright Bret Ingerman This.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
© 2016 SlidePlayer.com Inc. All rights reserved.