stealthbits sensitive data discovery solutions
DESCRIPTION
STEALTHbits offers a "Top-Down" and "Bottom-Up" approach to Sensitive Data Discovery. Learn more about both of them in this brief presentation.TRANSCRIPT
STEALTHbits Technologies, Inc.Sensitive Data Discovery
Solutions
STEALTHbits TechnologiesAll About Data. Agenda
About STEALTHbits Sensitive Data Discovery – Top/Down or Bottom/Up? Product Overview
o Use Caseso Statisticso How it Workso Roadmap
Product Demonstration
STEALTHbits TechnologiesAll About Data. Sensitive Data Discovery
Top – Down: Integrated Sensitive Data Discovery
Bottom – Up: Focused Sensitive Data Discovery
StealthAUDIT®
Utilize Sensitive Data Discovery to enrich the
context of Unstructured Data during Data Access
Governance processes.StealthSEEK®
The solution for those tasked with Sensitive Data Discovery
and tactical remediation of issues like permissions,
misuse, and improper storage of Sensitive Data.
STEALTHbits TechnologiesAll About Data. What is StealthSEEK®?
StealthSEEK is:o Tactical Sensitive Data
Discoveryo Easy-to-Useo Flexible &
Customizableo Scalableo Intelligent
STEALTHbits TechnologiesAll About Data. StealthSEEK® Use Cases
StealthSEEK is used for:
Compliance Fulfillmento PCI-DSS, HIPAA/HITECH, SOX, GLBA,
FERPA, ITAR, and more
Proactive Risk Mitigationo Set up best practices to proactively avoid
untoward incidents
Incident Responseo Respond to data breach events or failed
audits
Who Uses StealthSEEK?
Universities/Higher Education• Student and Faculty Info (SSN, Birth Dates, etc.)• Health Records• Financial Aid Records
Healthcare/Hospitals• Health Records• Patient Data• Prescription Drugs
Financial Institutions/Credit Unions• Personal Financial Documents• Credit Card Information
Defense/Manufacturing• ITAR related information• Intellectual Property
Retail• Credit Card Information• Email Addresses & Contact Details
STEALTHbits TechnologiesAll About Data. Some Statistics
In the United States, the average cost per organization for data breach incidents was $5.4 million last yearo 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013
Through 2016, the financial impact of cybercrime will grow 10 percent per yearo www.gartner.com, Gartner ., December 2011
In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies.o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
STEALTHbits TechnologiesAll About Data. How it Works
Discovery & Risk Profiling Find Sensitive Data Remediate & Report
• Where is the data?• Where does the greatest risk
exist?• What does risk mean to you?
• What kind of sensitive content is out there?
• Who has access to it? How did they get that access?
• Delete, Copy, Move/Consolidate Sensitive Content
• Report on findings and access rights
A Proven, 3-Step Workflow
STEALTHbits TechnologiesAll About Data. StealthSEEK® Roadmap
What’s next in the queue?
Owner Notification Workflow
Office 365 support, SharePoint scanning – v3.x (Q4 2014)
Data Classification and Tagging
STEALTHbits TechnologiesAll About Data.
Attend a Demoo www.stealthbits.com/events
Next Steps
Request a Trialo www.stealthbits.com/trial
Learn Moreo www.stealthbits.com/resources
Ask Us a Questiono www.stealthbits.com/company/contact-us
FREE 30-Day StealthSEEK Trial!
http://www.stealthbits.com/trial