stealthbits sensitive data discovery solutions

Post on 22-Nov-2014

112 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

STEALTHbits offers a "Top-Down" and "Bottom-Up" approach to Sensitive Data Discovery. Learn more about both of them in this brief presentation.

TRANSCRIPT

STEALTHbits Technologies, Inc.Sensitive Data Discovery

Solutions

STEALTHbits TechnologiesAll About Data. Agenda

About STEALTHbits Sensitive Data Discovery – Top/Down or Bottom/Up? Product Overview

o Use Caseso Statisticso How it Workso Roadmap

Product Demonstration

STEALTHbits TechnologiesAll About Data. Sensitive Data Discovery

Top – Down: Integrated Sensitive Data Discovery

Bottom – Up: Focused Sensitive Data Discovery

StealthAUDIT®

Utilize Sensitive Data Discovery to enrich the

context of Unstructured Data during Data Access

Governance processes.StealthSEEK®

The solution for those tasked with Sensitive Data Discovery

and tactical remediation of issues like permissions,

misuse, and improper storage of Sensitive Data.

STEALTHbits TechnologiesAll About Data. What is StealthSEEK®?

StealthSEEK is:o Tactical Sensitive Data

Discoveryo Easy-to-Useo Flexible &

Customizableo Scalableo Intelligent

STEALTHbits TechnologiesAll About Data. StealthSEEK® Use Cases

StealthSEEK is used for:

Compliance Fulfillmento PCI-DSS, HIPAA/HITECH, SOX, GLBA,

FERPA, ITAR, and more

Proactive Risk Mitigationo Set up best practices to proactively avoid

untoward incidents

Incident Responseo Respond to data breach events or failed

audits

Who Uses StealthSEEK?

Universities/Higher Education• Student and Faculty Info (SSN, Birth Dates, etc.)• Health Records• Financial Aid Records

Healthcare/Hospitals• Health Records• Patient Data• Prescription Drugs

Financial Institutions/Credit Unions• Personal Financial Documents• Credit Card Information

Defense/Manufacturing• ITAR related information• Intellectual Property

Retail• Credit Card Information• Email Addresses & Contact Details

STEALTHbits TechnologiesAll About Data. Some Statistics

In the United States, the average cost per organization for data breach incidents was $5.4 million last yearo 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013

Through 2016, the financial impact of cybercrime will grow 10 percent per yearo www.gartner.com, Gartner ., December 2011

In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies.o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010

STEALTHbits TechnologiesAll About Data. How it Works

Discovery & Risk Profiling Find Sensitive Data Remediate & Report

• Where is the data?• Where does the greatest risk

exist?• What does risk mean to you?

• What kind of sensitive content is out there?

• Who has access to it? How did they get that access?

• Delete, Copy, Move/Consolidate Sensitive Content

• Report on findings and access rights

A Proven, 3-Step Workflow

STEALTHbits TechnologiesAll About Data. StealthSEEK® Roadmap

What’s next in the queue?

Owner Notification Workflow

Office 365 support, SharePoint scanning – v3.x (Q4 2014)

Data Classification and Tagging

STEALTHbits TechnologiesAll About Data.

Attend a Demoo www.stealthbits.com/events

Next Steps

Request a Trialo www.stealthbits.com/trial

Learn Moreo www.stealthbits.com/resources

Ask Us a Questiono www.stealthbits.com/company/contact-us

FREE 30-Day StealthSEEK Trial!

http://www.stealthbits.com/trial

top related