We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAthena Rickett
Modified about 1 year ago
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Who is STEALTHbits? 2 For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. |3 Premier Customers Technology Partners
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Agenda What is Unstructured Data? Why should Unstructured Data be at the top of your list of security concerns? What challenges are you going to face in trying to secure your Unstructured Data? What can you do today to begin mitigating your risk? What should you be thinking about tomorrow to control access to Unstructured Data permanently?
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What is Unstructured Data? Technically Speaking – Data that lacks a defined structure, unlike structured data that fits into the traditional database row and column paradigm Non-Technical Translation – “Human-generated” Data – Documents, Spreadsheets, Presentations, and other data types that reside on File Shares, in Collaboration Portals (i.e. SharePoint) on Desktops and Servers White Paper Download ‘Getting Unstructured Data Under Control for Security & Compliance’ -Randy Franklin Smith www.stealthbits.com/rfs-getting- unstructured-data-under-control-white-paper
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Challenges Understanding risk exposed by insider access to data Establishing business data ownership to ensure proper access oversight Gaining full insight to how access is granted to all organizational data Impacts Rogue Barclays employee uses access to defunct line of business data to sell customer info for profit Hospital employee accesses hundreds of patient records even though they weren’t under their care Improperly configured access leads to massive data breach
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Know 80% of an organization’s data is unstructured (dark data) There is a lot of it 650% growth predicted in next 5 years It is growing fastSecurity is critical 30 - 40% of that data is sensitive
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Unstructured Data - What You Don’t Know Ownership – 91% of organizations lack a process to determine data ownership Who has access to what? – 76% of organizations are unable to determine who has access to their data The Risk – Audit & Regulatory Fines SOX/PCI/MAS – Sensitive Data Leakage Brand damage – Inability to Execute IAM / IAG DLP
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Access Today Windows File Systems EMC/Isilon & NetApp NAS SharePoint NFS & UNIX Active Directory & LDAP NIS Local Users & Groups SharePoint Windows File Systems EMC/Isilon & NetApp NAS Local Users & Groups NFS & UNIX SharePoint Admins AD Admins UNIX Admins Helpdesk Admins Business Data Owners? Access has grown organically with the infrastructure Granting access is a matrix operation No one knows the whole story
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What has IAM done for Unstructured Data? Focus on applications – Connectors are king With unstructured data, there is nowhere to connect – Scale of the problem too large – Too many file stores IAM HRERPData?CRM
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What can you do today? Discover where Unstructured Data Exists – Close the door on Open Access Open Access Remediation (File Shares & SharePoint Sites) Identify your Local Administrators and recertify their access Clean-up your Mess – Active Directory Clean-up Stale Groups, Users, Computers Toxic Conditions (Circular, Deep-level, Improper Nesting) Attribute Incompleteness Find the data that poses the greatest risk – Sensitive Data Discovery Compliance data, PII (Customer and Employee data), Trade Secrets, etc.
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | What should you be thinking about tomorrow? Understand where Active Directory Groups have access – Determine whether or not they still need access – Transform your Security Model (Resource-based Groups) – Assign Owners/Data Custodians Put a Data Access Governance Program in place – Integrate Unstructured Data with Identity & Access Management platforms – Perform regular Entitlement Reviews – Implement Self-Service Access Requests Monitor Activity – Understand how access is changing and who is accessing the data – Track Anomalies and/or Suspicious Activity
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | Request a Trial o www.stealthbits.com/trial www.stealthbits.com/trial Learn More o www.stealthbits.com/resources www.stealthbits.com/resources Ask Us a Question o www.stealthbits.com/company/contact-us www.stealthbits.com/company/contact-us Attend a Demo o www.stealthbits.com/events www.stealthbits.com/events
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance.
Extending IBM Security Identity Manager With StealthAUDIT for Data & A ccess Governance Charlie Palella – IBM Alliance Manager
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager
VARONIS OVERVIEW DATA GOVERNANCE & SECURE FILE SHARING JUNE 5, 2013 Presented By: Dietrich Benjes VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Developing a Culture of Information Management You’ve selected your ECM solution – Now what? Paul Bauman TOWER Software December 13, 2006.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Page-1 ORACLE DATABASE SECURITY. Page-2 Oracle Database Security Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced.
General Business Secure Information Sharing in SharePoint 2010 Antonio Maio Senior Product Manager, Titus Inc.
Project 2003 Presentation Ben Howard 15 th July 2003.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Copyright © 2006 Quest Software Quest SharePoint Management.
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Files Matter … to Users and Administrators. Files Matter … IT Directors and Administrators.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Corporate Efficiency Meeting Improving Your Business Processes Using SharePoint and Beyond.
PRINTING IN THE DISTRIBUTED ENVIRONMENT When Mobile Matters Tricerat, Inc All rights reserved.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
Understand Audit Policies LESSON Security Fundamentals.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Security and the Questions Business Users should be asking the Techies.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Agile Information Lifecycle: A Customer Journey March 2016 Dan Jennings Veritas Partner Technical Account Manager +44 (0) Veritas Technologies.
PARTNER CAMPAIGN PACK 2015 ObserveIT Campaign Roadmap Introducing ObserveIT Partner Campaign Packs Overview of Application User Campaign Pack.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Rick Killpack Senior Product Manager Identity and Security Novell, Inc. sample for a picture in the title slide SAP and Novell: Extending IT Governance.
Agenda Customer pain points and how data classification can help Ecosystem Windows Server 2008 R2 for file Classification Infrastructure Demos Customer.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | OFSAAAI: Modeling Platform Enterprise R Modeling Platform Gagan Deep Singh Director.
Connecting the Dots…How OSIsoft Leverages Microsoft Technology Across the RtPM Platform Christian R. Luckock Technical Strategist OSIsoft.
Planning an Active Directory Deployment Lesson 1.
A Governance-based Approach to Identity Management Darran Rolls – CTO – SailPoint Technologies Zurich.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
© 2017 SlidePlayer.com Inc. All rights reserved.