Data-Centric Security: An Effective Line of Defense Against Data Breaches

1
THE SOLUTION Bring security closer to the data and secure the data itself rather than networks, servers or applications. TODAY’ S HYBRID ENTERPRISE DATA ENVIRONMENTS Raise new security challenges that need new solutions Data-Centric Security DATA-CENTRIC SECURITY An Effective Line of Defense Against Data Breaches What The Savviest Security Buyers Know That No One Else Does DATA-CENTRIC SECURITY MINIMIZES RISKS BlueTalon provides data-centric security across Hadoop, SQL and big data environments. The BlueTalon Policy Engine enables consistent and precise user access controls, dynamic data masking and auditing across multiple data repositories regardless of applications in use. BlueTalon is used by Fortune 500 companies to secure their data initiatives deployed on-premises and in the cloud. Sources: Verizon DBIR report 2012 to 2015, SANS Institute, Ponemon Institute, US News www.bluetalon.com [email protected] +1 (888) 534 7154 IT’S ONLY GETTING WORSE Enterprise data environments are getting more complex Class action LAWSUITS MORE REGULATIONS Government, industries, others MORE ATTACKS, more targeted, more sophisticated NEW TECHNOLOGIES: Hadoop, NoSQL, Cloud A lot MORE DATA MORE USERS with broader access SOLUTIONS PAIN POINTS RDBMS Public and Private Cloud Hybrid Environments Hadoop Precise user access controls to give users access to the data they need, not a byte more Consistent policies across repositories including cloud environments High performance security and dynamic controls designed for today’s data environments Complete track record of who requested what data across the enterprise Users have too much (or too little) access to enterprise data Security policies don’t follow the data Current security tools don’t scale to large volumes of data Lack of visibility into who has access to what data MASSIVE REDUCTION NUMBER OF RECORDS AT RISK ? ? ? in the number of records at risk with data-centric security without data-centric security Giving users access to the data they need, not a byte more, delivers the greatest ROI in security Securing data in cloud and on-premises repositories is a major challenge for new data initiatives THE UNTOLD STORY BEHIND Today’s Data Breaches of data breaches happen at the database level 96 % of the time, attackers use stolen credentials Compromised account led to 76 million stolen records 1 compromised accounts led to 80 million stolen records 5 of employees say they have access to data they shouldn’t 71 % Hackers will GET IN, it’s almost inevitable. Focusing on PROTECTING THE DATA is needed. LOGIN 95 %

Transcript of Data-Centric Security: An Effective Line of Defense Against Data Breaches

THE SOLUTION

Bring security closer to the data and secure the data itself rather than networks, servers or applications.

TODAY’ S HYBRID ENTERPRISE DATA ENVIRONMENTS

Raise new security challenges that need new solutions

Data-Centric Security

DATA-CENTRIC SECURITY

An Effective Line of Defense Against Data Breaches

What The Savviest Security Buyers Know That No One Else Does

DATA-CENTRIC SECURITY MINIMIZES RISKS

BlueTalon provides data-centric security across Hadoop, SQL and big data

environments. The BlueTalon Policy Engine enables consistent and precise

user access controls, dynamic data masking and auditing across multiple data

repositories regardless of applications in use. BlueTalon is used by Fortune 500

companies to secure their data initiatives deployed on-premises and in the cloud.

Sources: Verizon DBIR report 2012 to 2015, SANS Institute, Ponemon Institute, US News

www.bluetalon.com

[email protected]

+1 (888) 534 7154

IT’S ONLY GETTING WORSE

Enterprise data environments are getting more complex

Class action LAWSUITS

MORE REGULATIONSGovernment, industries,others

MORE ATTACKS,more targeted, more sophisticated

NEW TECHNOLOGIES:Hadoop, NoSQL, Cloud

A lot MORE DATA

MORE USERS with broader access

SOLUTIONSPAIN POINTS

RDBMS Public and Private Cloud

HybridEnvironments

Hadoop

Precise user access controls to give users access to the data they need, not a byte more

Consistent policies across repositories including cloud

environments

High performance security and dynamic controls designed for

today’s data environments

Complete track record of who requested what data

across the enterprise

Users have too much (or too little) access to enterprise data

Security policies don’t follow the data

Current security tools don’t scale to large

volumes of data

Lack of visibility into who has access to what data

MASSIVE REDUCTION

NUMBER OF RECORDS AT RISK

?

? ?

in the number of records at risk

with data-centric security

without data-centric security

Giving users access to the data they need, not a byte more, delivers the

greatest ROI in security

Securing data in cloud and on-premises repositories is a

major challenge for new data initiatives

THE UNTOLD STORY BEHIND

Today’s Data Breaches

of data breaches happen at the database level

96%of the time, attackers use stolen credentials

Compromised account led to 76 million stolen records

1

compromised accounts led to 80 million stolen records

5 of employees say they have access to data they shouldn’t

71%Hackers will GET IN, it’s almost inevitable. Focusing on PROTECTING THE DATA is needed.

LOGIN

95%