Agile Information Lifecycle: A Customer Journey March 2016 Dan Jennings Veritas Partner Technical Account Manager +44 (0)7590 003199 Veritas Technologies.

Slides:



Advertisements
Similar presentations
Customer Strategic Presentation March 2010
Advertisements

IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Driving change in information risk within the financial services industry Subtitle Date.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Bill McClanahan – Principal Business Consultant LPS Integration.
1 Exchange Management : Archiving & Storage Do you really need 3rd party archiving with Exchange 2010? James Bushell Symantec Enterprise.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Archiving Best Practices with Symantec Enterprise Vault 8.0 Lou Zeidman Regional Sales Manager, Information Risk Management.
Next Generation Partner Program Fady Iskander Symantec Corp.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Microsoft Dynamics AX Name Title Microsoft Corporation Financial Management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Data Protection Officer’s Overview of the GDPR
Understanding EU GDPR from an Office 365 perspective
Microsoft 365 Get help with regulatory compliance
GDPR – What’s it all about???
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
The utility belt for managing security and compliance in Office 365
Microsoft Corporation
Region One Information Technology
GDPR Security: How to do IT? IT reediness for competitive advantage
Bob Siegel President Privacy Ref, Inc.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Varonis Overview.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Information Social Access Mapping: Who is doing what with data?
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
General Data Protection Regulation “11 months in”
Make it real: Help your customers comply with the GDPR
Microsoft Data Insights Summit
Presentation transcript:

Agile Information Lifecycle: A Customer Journey March 2016 Dan Jennings Veritas Partner Technical Account Manager +44 (0) Veritas Technologies LLC Office: +44 (0) address:

Background Regional Healthcare Company: Protects Sensitive Data 2 GoalsData Insight Benefits Found sensitive data How to protect it? Who should have access? 10 Data centers/sites NetApp (>20K shares) 15,000 users 4M access events/day Key benefit: Decreased open shares and lockdown sensitive files. Identified data owners and notify to resolve non-compliance Located private sensitive data (i.e. medical records) with excessive permissions Accessed activity reports for audit Investigated issues with important folders disappearing Reduce loss of confidential data Secure PII Demonstrate Compliance (HIPAA…) Incident Response

Copyright © 2015 Symantec Corporation3

An Analogy… 4

IT “Service” Today – Silos of Tactical Delivery 5 Service/Application Owners Storage AdministratorsServer Administrators IT Project 1 Inefficiency Separated Infrastructure Isolated Information Siloed Data

Silo Effect – Multiplied. 6 Strategic Inefficiency Separated Infrastructure Isolated Information Business Unit 1 Business Unit 2 Business Unit 3 Business Unit 4

Business Value of Information TIME EXPECTED (+)(+) (-)(-) 37% FILE SHARING > DATABERG! $5M – 1PB 14% clean 32% ROT 54% Dark 7% CDO GOV GAP GAIN VISIBILITY TAKE ACTION ASSUME CONTROL WHAT? WHERE? WHAT TO DO WITH IT? WHO’S RESPONSIBLE? REALIZED Veritas Step Change Governance 7

Zoom in on Storage 8

9

The nuts and bolts – Share Breakdown 10

11 The nuts and bolts – “Duplicate” Files

Copyright © 2015 Symantec Corporation12 The nuts and bolts – Last Accessed

Strategy for Information Management 1 Discover 2 Report and Recommend 3 Execute Policy – Archive & eDiscovery 4 Execute Policy – Data Loss Prevention 5 Execute Policy – Information Delivery 13

Information Management 3 Archive Exchange & Unstructured Value: Efficient storage and management of business information only. Delete irrelevant information On-Prem / Cloud 4 eDiscovery Regulatory &/or Legal Hold Value:Brand protection. Compliance. IT burden reduction. FoI GDPR On-Prem / Cloud 5 DLP with Symantec / Other Value:Prnad protection Privacy GDPR compliance On-Prm / Cloud Target People: IT Security Management, Legal 6 Information Delivery with Veritas Infoscale and Infrastructure Value: OnpPrem, Priv/Pub Cloud, Hybrid 14 Discovery Layer

Strategic Information Delivery 15 Project 2 Business Unit 1 Business Unit 3 Strategic Storage Implementation EfficientStandardised Shared Information Infrastructure Service/Application Owners Storage Administrators Server Administrators Service/Application Owners Storage Administrators Server Administrators Service/Application Owners Storage Administrators Server Administrators

Case Study: Regional Energy Company 16 Background GoalsData Insight Benefits Lacked visibility into who owns what data on shared storage Environment –NetApp® 300 TB –Windows® 100 TB –Regulated design data Identified data owners and bill shared resources to appropriate line of business Reduced stale data, PST files and chose appropriate storage for migrations Locate “Lost Files”; Investigate issues with legally protected data being deleted Evaluated ACLs for Department of Energy protected data Chargeback Data Clean-up Data Forensics Secure Regulated Data

Our Analogy… 17

Thank you! Copyright © 2015 Symantec Corporation. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Dan Jennings +44 (0)

Information Social Access Mapping: Who is doing what with data? Dan Jennings Technical Account Manager March 2016

Identify Data Owners 20

Rule-based Inference of Data Owners with Custom Attribute Mapping 21

Track User Activity for Investigations or Audit 22

Policies to Proactively Monitor Sensitive Data Usage 23 Monitor activity to data Select folders or use DLP classification Alert if activity exceeds threshold Monitor activity of users Alert if user activity deviates from baseline Monitor activity to data Select folders or use DLP classification Alert if activity exceeds threshold Monitor activity of users Alert if user activity deviates from baseline Symantec Data Insight 4.0

Social Network Map: Secure Collaboration 24 Detect outliers among users Reduce risk from excessive access permissions

Data Loss Prevention View: Incident and Data Owner Symantec Data Insight John Smith Data Insight

Case Study 26 Background GoalsData Insight Benefits Focus on securing unstructured data Where to start? How to remediate? NetApp, Windows, SharePoint (1PB+) Key benefit: Facilitate investigations for malicious activities Discover Open Shares, Review ownership/activity analysis to drive lockdown without disruption Prioritize DLP scans based on Open Shares report; Identify data owners Identify complex shares, data owners and active departments Identify hotspots or unusual spikes in activity; Data clean-up by type Reduce Open Shares Risk Sensitive Data Clean-up File Shares Consolidation Storage Remediation Large Financial Services Company Remediates Open Shares

Thank you! Copyright © 2015 Symantec Corporation. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Dan Jennings +44 (0)

Time & Cost DIaaS Service eXSP 1. Install Two weeks 2. Discover, 3. Report, 4. Recommend Up to three months 28 Low cost design to implement and execute automated storage policies that deliver end-customer business information

What is Information Governance? Copyright © 2015 Symantec Corporation29 Copyright © 2015 Symantec Corporation 29 Copyright © 2015 Symantec Corporation29Copyright © 2015 Symantec Corporation29Copyright © 2015 Symantec Corporation29 …the activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs

Information Governance – The risk side Copyright © 2015 Symantec Corporation30Copyright © 2015 Symantec Corporation30Copyright © 2015 Symantec Corporation30Copyright © 2015 Symantec Corporation30 FINANCE 6 Global banks £2.6bn FOREX Conversations on social & Connect MANUFACTURING German Sausage cartel £268m Colluding on price TRAVEL £150k to Information Commissioners Office Data Breach Fine – 1.5m user details HEALTHCARE Torbay Care Trust £175k Personal data published REGULATORS €100m/5% proposed EU fines for Data Privacy Compliance CHARITY £70k due to ‘lost’ data

Emerging EU Data Privacy Laws 1995 Data Protection Directive to be replaced by General Data Protection Regulation (GDPR) – 2017 EU Zone – 28 member countries, 0.5billion citizens producing $18 trillion every year –Mandatory breach notifications - 72 hours and large fines –The ‘Right To Be Forgotten’ - Article 17 –Consumer Profiling Restricted - Data should not used without consent –Be Accountable for your Data - Data Protection Officer (DPO) GDPR aim is to HARMONISE 31

Shifting Sands 32

Background Case Study 33 GoalsData Insight Benefits Found sensitive data How to protect it? Who should have access? 10 Data centers/sites NetApp (>20K shares) 15,000 users 4M access events/day Key benefit: Decreased open shares and lockdown sensitive files. Identified data owners and notify to resolve non-compliance Located private sensitive data (i.e. medical records) with excessive permissions Accessed activity reports for audit Investigated issues with important folders disappearing Reduce loss of confidential data Secure PII Demonstrate Compliance (HIPAA…) Incident Response Regional Healthcare Company Protects Sensitive Data