Data-Centric Security: An Effective Line of Defense Against Data Breaches
-
Upload
l-natalie-hernandez -
Category
Data & Analytics
-
view
179 -
download
0
Transcript of Data-Centric Security: An Effective Line of Defense Against Data Breaches
THE SOLUTION
Bring security closer to the data and secure the data itself rather than networks, servers or applications.
TODAY’ S HYBRID ENTERPRISE DATA ENVIRONMENTS
Raise new security challenges that need new solutions
Data-Centric Security
DATA-CENTRIC SECURITY
An Effective Line of Defense Against Data Breaches
What The Savviest Security Buyers Know That No One Else Does
DATA-CENTRIC SECURITY MINIMIZES RISKS
BlueTalon provides data-centric security across Hadoop, SQL and big data
environments. The BlueTalon Policy Engine enables consistent and precise
user access controls, dynamic data masking and auditing across multiple data
repositories regardless of applications in use. BlueTalon is used by Fortune 500
companies to secure their data initiatives deployed on-premises and in the cloud.
Sources: Verizon DBIR report 2012 to 2015, SANS Institute, Ponemon Institute, US News
www.bluetalon.com
+1 (888) 534 7154
IT’S ONLY GETTING WORSE
Enterprise data environments are getting more complex
Class action LAWSUITS
MORE REGULATIONSGovernment, industries,others
MORE ATTACKS,more targeted, more sophisticated
NEW TECHNOLOGIES:Hadoop, NoSQL, Cloud
A lot MORE DATA
MORE USERS with broader access
SOLUTIONSPAIN POINTS
RDBMS Public and Private Cloud
HybridEnvironments
Hadoop
Precise user access controls to give users access to the data they need, not a byte more
Consistent policies across repositories including cloud
environments
High performance security and dynamic controls designed for
today’s data environments
Complete track record of who requested what data
across the enterprise
Users have too much (or too little) access to enterprise data
Security policies don’t follow the data
Current security tools don’t scale to large
volumes of data
Lack of visibility into who has access to what data
MASSIVE REDUCTION
NUMBER OF RECORDS AT RISK
?
? ?
in the number of records at risk
with data-centric security
without data-centric security
Giving users access to the data they need, not a byte more, delivers the
greatest ROI in security
Securing data in cloud and on-premises repositories is a
major challenge for new data initiatives
THE UNTOLD STORY BEHIND
Today’s Data Breaches
of data breaches happen at the database level
96%of the time, attackers use stolen credentials
Compromised account led to 76 million stolen records
1
compromised accounts led to 80 million stolen records
5 of employees say they have access to data they shouldn’t
71%Hackers will GET IN, it’s almost inevitable. Focusing on PROTECTING THE DATA is needed.
LOGIN
95%