1 / 9

STEALTHbits Technologies, Inc.

STEALTHbits Technologies, Inc. What is Unstructured Data and what can you do to secure it today? Presenter: Adam Laub, VP Marketing. Agenda. What is Unstructured Data? Why should Unstructured Data be at the top of your list of security concerns?

britain
Download Presentation

STEALTHbits Technologies, Inc.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STEALTHbits Technologies, Inc. What is Unstructured Data and what can you do to secure it today? Presenter: Adam Laub, VP Marketing

  2. Agenda • What is Unstructured Data? • Why should Unstructured Data be at the top of your list of security concerns? • What challenges are you going to face in trying to secure your Unstructured Data? • What can you do today to begin mitigating your risk? • What should you be thinking about tomorrow to control access to Unstructured Data permanently?

  3. What is Unstructured Data? • Technically Speaking • Data that lacks a defined structure, unlike structured data that fits into the traditional database row and column paradigm • Non-Technical Translation • User-generated Data • Documents, Spreadsheets, Presentations, and other data types that reside on File Shares, in Collaboration Portals (i.e. SharePoint) on Desktops and Servers • White Paper Download • ‘Getting Unstructured Data Under Control for Security & Compliance’ • Randy Franklin Smith • www.stealthbits.com/rfs-getting-unstructured-data-under-control-white-paper

  4. Unstructured Data Importance to Security • Unstructured Data is commonly breached by internal employees with legitimate access to the data • Barclays • …“details on many aspects of customers' lives, including their earnings, bank account information, loans, medical information, insurance policies, passport numbers and national insurance numbers.” • Philip van Doorn (http://www.thestreet.com/story/12325789/1/barclays-data-breach-makes-target-look-tame.html) • NSA • …” Having 'root' or equivalent administrative status gave Snowden total access to all data”….”We know he had privileges because he was able to hide his tracks and edit the activity logs“… • Kelly Jackson Higgins – DarkReading.com - http://www.darkreading.com/attacks-breaches/how-did-snowden-do-it/240163887?pgno=2 (Quote from Jeff Hudson, CEO of Venafi)

  5. Unstructured Data Problems & Challenges It’s Dynamic & Complex • Access Sprawl • Joiner, Mover, Leaver Activity • Distributed Entitlements • Access Never thoroughly Reviewed/Adjusted • Data Explosion • 80% of all Data is unstructured (IBM) • 70% of all data is user created…85% of that data is maintained by corporations. (Century Link) • CSC predicts 650% increase in next 5 years • Risk Exposure on the Rise • Brand, Revenue & Reputation Exposure • Security Breach / Insider Threat • Compliance Findings • Service Level Impacts It’s Massive • Customer Example: • 10,000 Users • 8-10 NetApp Filers • 30,000,000+ Folders • 600,000,000+ Files • Trillions of Permissions! It’s Critical

  6. What can you do today? • Discover where Unstructured Data Exists • Close the door on Open Access • Open Access Remediation (File Shares & SharePoint Sites) • Identify your Local Administrators and recertify their access • Clean-up your Mess • Active Directory Clean-up • Stale Groups, Users, Computers • Toxic Conditions (Circular, Deep-level, Improper Nesting) • Attribute Incompleteness • Find the data that poses the greatest risk • Sensitive Data Discovery • Compliance data, PII (Customer and Employee data), Trade Secrets, etc.

  7. What should you be thinking about tomorrow? • Understand where Active Directory Groups have access • Determine whether or not they still need access • Transform your Security Model (Resource-based Groups) • Assign Owners/Data Custodians • Put a Data Access Governance Program in place • Integrate Unstructured Data with Identity & Access Management platforms • Perform regular Entitlement Reviews • Implement Self-Service Access Requests • Monitor Activity • Understand how access is changing and who is accessing the data • Track Anomalies and/or Suspicious Activity

  8. STEALTHbits Data Access Governance Suite Activity Monitoring Data Activity Tracking Permissions & Effective Access File Systems | SharePoint Ownership, Entitlement Reviews, and Self-Service Access Access Information Center (AIC) As a part of the DAG Suite, the AIC enables organizations to take the burden of Access Management (grant, review, revoke, attest) off of IT and put it in the hands of data custodians and end-users. With detailed reporting, view what permissions have been granted, how it translates into Effective Access, and what actions users are taking on your unstructured data. Gather all permissions to File Systems and SharePoint and correlate the information with Active Directory to determine true effective access to a given resource, as well as the level of permission each access avenue grants. Monitor activity to Windows File Systems, NetApp, EMC, and Hitachi NAS devices for complete insight into what users are reading, changing and deleting, as well as what permissions are attempting to be changed. http://www.stealthbits.com/data-access-governance-suite

  9. FREE Local Administrator Audit! Next Steps • Contact Us • info@stealthbits.com • Learn More • http://www.stealthbits.com • Request a Full Trial • http://www.stealthbits.com/trial http://www.stealthbits.com/FreeLocalAdmin

More Related