DataGravity Security Pop Quiz
-
Upload
datagravity -
Category
Technology
-
view
1.010 -
download
0
Transcript of DataGravity Security Pop Quiz
![Page 1: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/1.jpg)
SECURITYPOP QUIZ:
WHAT’S IN YOUR DATA?Answering hard questions about data security, compliance risks
![Page 2: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/2.jpg)
at most companies every year.
Unstructured data
is growing by
60 to 80%
Source: Gartner
![Page 3: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/3.jpg)
Companies are struggling to
secure all that data.
![Page 4: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/4.jpg)
Think about the widely
publicized breaches at
Morgan Stanley, Sony, Anthem Blue Cross Blue Shield
and many other businesses.
NEED PROOF?
![Page 5: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/5.jpg)
And those are
companies with
massive resources.
![Page 6: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/6.jpg)
Small and midsize
businesses (SMBs)
are potentially
more at risk.
![Page 7: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/7.jpg)
The Ponemon Insitute
estimates that
55% of SMBshave had data breaches.
![Page 8: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/8.jpg)
Your organization
also has
sensitive data –
![Page 9: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/9.jpg)
About employees,
customers and
trade secrets.
![Page 10: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/10.jpg)
Where is that data held?
![Page 11: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/11.jpg)
How is it protected?
![Page 12: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/12.jpg)
Who inside and outside the organization
can access it?
![Page 13: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/13.jpg)
What is the risk of holding information you can’t auditor visualize?
![Page 14: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/14.jpg)
These are all critical
security and governance
questions organizations
NEED TO ASKAND ANSWER.
![Page 15: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/15.jpg)
1. Secure sensitive information and systems.
2. Make sure you can audit forensic information.
MOST COMPLIANCE REGULATIONS INCLUDE TWO STEPS:
![Page 16: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/16.jpg)
What are you doing to address these steps?
![Page 17: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/17.jpg)
The most effective
place to address those
regulations is at the
point of storage.
![Page 18: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/18.jpg)
Household technology
has gotten smarter. Phones and wearables
have gotten smarter.
Storage devices need to get smarter, too.
![Page 19: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/19.jpg)
So why does most storage innovation stop at $/ OP and $/TB?
![Page 20: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/20.jpg)
Storage should be
treated as a throughput
device – transforming data as it writes, stores
and protects it.
![Page 21: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/21.jpg)
A device that can harden and secure data, as
well as protect it and
optimize it for discovery.
![Page 22: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/22.jpg)
BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:
Track user activity in real time down to the file level, even within VMs.
![Page 23: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/23.jpg)
BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:
Track user activity in real time down to the file level, even within VMs.
Track, search and analyze user access and audit trails.
![Page 24: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/24.jpg)
BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:
Track user activity in real time down to the file level, even within VMs.
Track, search and analyze user access and audit trails.
Identify sensitive content and content access patterns.
![Page 25: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/25.jpg)
Most organizations don’t know what data they have or where it lives.
![Page 26: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/26.jpg)
That lack of knowledge can open the door for internal or external data exposure or breaches.
![Page 27: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/27.jpg)
It’s time to get smarter about data
security and compliance.
![Page 28: DataGravity Security Pop Quiz](https://reader031.fdocuments.us/reader031/viewer/2022020218/55a78ecf1a28aba0318b466e/html5/thumbnails/28.jpg)
LEARN MORE ABOUT USING GOVERNANCE, RISK AND COMPLIANCE TO SECURE SENSITIVE DATA.
Follow DataGravity on Twitter.Like us on Facebook.Connect with us on LinkedIn.Check out our blog.Contact us.