Presentation is loading. Please wait.

Presentation is loading. Please wait.

STEALTHbits Technologies, Inc.

Similar presentations


Presentation on theme: "STEALTHbits Technologies, Inc."— Presentation transcript:

1 STEALTHbits Technologies, Inc.
Corporate Overview STEALTHbits Technologies, Inc.

2 About STEALTHbits STEALTHbits is a data security software company. We secure an organization’s information by defending against credential abuse and controlling access to data.

3 STEALTHbits At a Glance
40% of the Fortune 100 50% Growth Year Over Year 5 of 6 Largest Financials Consistently Profitable An established, profitable company Founded in 2001 96% Customer Retention 14 Years of Growth 65% R&D Utilities, Financials, Healthcare, Retail, Education Operations in 7 Countries Identify Threats. Secure Data. Reduce Risk.

4 Premier Customers Technology Partners
Working with the best organizations in the world, best technology partners in the world Technology Partners

5 Every Major Breach Involves Credential Abuse
$400MM – The estimated financial loss from 700 million compromised records. Verizon 2015 Data Breach Investigations Report The average number of days it takes to detect a breach is 200 to 230. "Sony Hacking Fallout Puts All Companies on Alert“, Associated Press, Dec 18, 2014 55% of breaches involve malicious insiders abusing their access. 57% of breaches involve the theft of unstructured data. “Survey on the Governance of Unstructured Data”, Ponemon Institute This is 3rd Party support for the problem Breaches are a big, expensive problem They take a long time to discover, only adding to the damage and adding to the cost And every headline-grabbing breach of late has involved credential theft and abuse - Sony, Target, Home Depot, Snowden, Ashley Madison, IRS, Press Release – And the whole reason people steal and abuse credentials is to get at data. Unstructured data is and will always be a target of breaches. A new report from the Ponemon Institute found that only 23 percent of its survey respondents felt their companies' unstructured data was properly secured. The institute polled 870 IT professionals, where 84 percent said that too many workers are able to access critical corporate information as unstructured data. In addition, the survey found that almost 76 percent of companies have no process to control employee access to unstructured data. Experton Group believes it will be difficult to automatically protect all unstructured data, since it is difficult, if not impossible, to determine the importance of unstructured data when it is created. Unstructured data includes information in , instant messages, published documents, and spreadsheets. Twenty-six percent of respondents said they are confident in their ability to always detect a data breach involving structured data, while only 12% are as confident if the breach involves unstructured data. The State of Data Centric Security, Ponemon Institute

6 The STEALTHbits Solution
A Three-Pronged Approach to Data Security “I need to know who has access to data and how they’re using it.” “I need to monitor and control changes and access in my environment.” “I need to know when bad actors are trying to access my data so I can stop them.” Change & Access Monitoring Threat & Intrusion Detection Data Access Governance

7 STEALTHbits Product Portfolio
Coming Soon! Auditing, compliance, and governance platform for unstructured data Change and access monitoring platform with real-time alerting Purpose-built user behavior analytics and threat detection solution

8 StealthAUDIT Management Platform
Find and Control Access to Unstructured Data What does it do? Gathers and analyzes data from on premise and cloud based systems and applications to answer critical Data Access Governance questions: Who has access to what data? How do they have access to the data? What level of access do they have to the data? Where is sensitive data? Who owns the data? Use Cases Open Access Remediation Sensitive Data Discovery File Activity Monitoring Active Directory Cleanup Data Ownership Identification Governance – Ownership Assignment, Entitlement Reviews, and Self-Service Access Requests Differentiators Speed & Scalability Small Footprint & Agentless Data Collection Flexibility Interoperability with IAM solutions In the corporate overview deck, we give a high level overview of the whole platform. Focus on DAG because that’s where our bread and butter has been. But you most likely won’t pitch the entire platform, you’ll focus on one of the use cases. If you need more detail, move to the SA-specific deck. At the end of the day, everything we do is about understanding and controlling access to unstructured data. Scalability – Agentless, low-profile architecture allows us to scale to the largest environments in the world Flexibility – Data is stored in SQL database, allowing for maximum flexibility in analysis and easy integration with other products Data Collection – Scope and speed of our data collection is unmatched in the market

9 StealthINTERCEPT What does it do? Use Cases Differentiators
Monitor and Alert on Changes and Access Within the Microsoft Infrastructure What does it do? Monitors, alerts on, and blocks hazardous changes and access to Active Directory, file systems, and Microsoft Exchange: Sensitive Active Directory Groups Critical GPOs and AD Settings File Permissions and Access Critical Mailboxes Use Cases Modifications of AD objects and Group Policy Objects (GPOs) Suspicious activity and access modifications to sensitive data Non-owner mailbox access events and permission changes Differentiators No reliance on native logs Authentication-based attack analytics Integration with all leading SIEM solutions

10 Purpose-Built UBA for Credential Theft and Abuse
StealthDEFEND Coming Soon! Purpose-Built UBA for Credential Theft and Abuse What does it do? Detects and disables compromised and abused accounts. User Behavior Analytics Machine Learning Access Auditing & Sensitive Data Discovery Use Cases Authentication-Based Attacks Privileged Account Abuse Malicious Insiders Ransomware/Malware Differentiators Purpose-built UBA solution Focused on Active Directory credential theft or abuse SIEM Integration Account Blocking

11 Fulfill Compliance Requirements
Why STEALTHbits Reduce Security Risk The Benefits Fulfill Compliance Requirements Reduce Operations Costs

12


Download ppt "STEALTHbits Technologies, Inc."

Similar presentations


Ads by Google