stealthbits sensitive data discovery solutions

9
STEALTHbits Technologies, Inc. Sensitive Data Discovery Solutions

Upload: stealthbits-technologies

Post on 22-Nov-2014

112 views

Category:

Technology


2 download

DESCRIPTION

STEALTHbits offers a "Top-Down" and "Bottom-Up" approach to Sensitive Data Discovery. Learn more about both of them in this brief presentation.

TRANSCRIPT

Page 1: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits Technologies, Inc.Sensitive Data Discovery

Solutions

Page 2: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. Agenda

About STEALTHbits Sensitive Data Discovery – Top/Down or Bottom/Up? Product Overview

o Use Caseso Statisticso How it Workso Roadmap

Product Demonstration

Page 3: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. Sensitive Data Discovery

Top – Down: Integrated Sensitive Data Discovery

Bottom – Up: Focused Sensitive Data Discovery

StealthAUDIT®

Utilize Sensitive Data Discovery to enrich the

context of Unstructured Data during Data Access

Governance processes.StealthSEEK®

The solution for those tasked with Sensitive Data Discovery

and tactical remediation of issues like permissions,

misuse, and improper storage of Sensitive Data.

Page 4: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. What is StealthSEEK®?

StealthSEEK is:o Tactical Sensitive Data

Discoveryo Easy-to-Useo Flexible &

Customizableo Scalableo Intelligent

Page 5: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. StealthSEEK® Use Cases

StealthSEEK is used for:

Compliance Fulfillmento PCI-DSS, HIPAA/HITECH, SOX, GLBA,

FERPA, ITAR, and more

Proactive Risk Mitigationo Set up best practices to proactively avoid

untoward incidents

Incident Responseo Respond to data breach events or failed

audits

Who Uses StealthSEEK?

Universities/Higher Education• Student and Faculty Info (SSN, Birth Dates, etc.)• Health Records• Financial Aid Records

Healthcare/Hospitals• Health Records• Patient Data• Prescription Drugs

Financial Institutions/Credit Unions• Personal Financial Documents• Credit Card Information

Defense/Manufacturing• ITAR related information• Intellectual Property

Retail• Credit Card Information• Email Addresses & Contact Details

Page 6: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. Some Statistics

In the United States, the average cost per organization for data breach incidents was $5.4 million last yearo 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013

Through 2016, the financial impact of cybercrime will grow 10 percent per yearo www.gartner.com, Gartner ., December 2011

In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies.o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010

Page 7: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. How it Works

Discovery & Risk Profiling Find Sensitive Data Remediate & Report

• Where is the data?• Where does the greatest risk

exist?• What does risk mean to you?

• What kind of sensitive content is out there?

• Who has access to it? How did they get that access?

• Delete, Copy, Move/Consolidate Sensitive Content

• Report on findings and access rights

A Proven, 3-Step Workflow

Page 8: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data. StealthSEEK® Roadmap

What’s next in the queue?

Owner Notification Workflow

Office 365 support, SharePoint scanning – v3.x (Q4 2014)

Data Classification and Tagging

Page 9: STEALTHbits Sensitive Data Discovery Solutions

STEALTHbits TechnologiesAll About Data.

Attend a Demoo www.stealthbits.com/events

Next Steps

Request a Trialo www.stealthbits.com/trial

Learn Moreo www.stealthbits.com/resources

Ask Us a Questiono www.stealthbits.com/company/contact-us

FREE 30-Day StealthSEEK Trial!

http://www.stealthbits.com/trial