STEALTHbits Sensitive Data Discovery Solutions
-
Upload
stealthbits-technologies -
Category
Technology
-
view
110 -
download
2
description
Transcript of STEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Technologies, Inc.Sensitive Data Discovery
Solutions
STEALTHbits TechnologiesAll About Data. Agenda
About STEALTHbits Sensitive Data Discovery – Top/Down or Bottom/Up? Product Overview
o Use Caseso Statisticso How it Workso Roadmap
Product Demonstration
STEALTHbits TechnologiesAll About Data. Sensitive Data Discovery
Top – Down: Integrated Sensitive Data Discovery
Bottom – Up: Focused Sensitive Data Discovery
StealthAUDIT®
Utilize Sensitive Data Discovery to enrich the
context of Unstructured Data during Data Access
Governance processes.StealthSEEK®
The solution for those tasked with Sensitive Data Discovery
and tactical remediation of issues like permissions,
misuse, and improper storage of Sensitive Data.
STEALTHbits TechnologiesAll About Data. What is StealthSEEK®?
StealthSEEK is:o Tactical Sensitive Data
Discoveryo Easy-to-Useo Flexible &
Customizableo Scalableo Intelligent
STEALTHbits TechnologiesAll About Data. StealthSEEK® Use Cases
StealthSEEK is used for:
Compliance Fulfillmento PCI-DSS, HIPAA/HITECH, SOX, GLBA,
FERPA, ITAR, and more
Proactive Risk Mitigationo Set up best practices to proactively avoid
untoward incidents
Incident Responseo Respond to data breach events or failed
audits
Who Uses StealthSEEK?
Universities/Higher Education• Student and Faculty Info (SSN, Birth Dates, etc.)• Health Records• Financial Aid Records
Healthcare/Hospitals• Health Records• Patient Data• Prescription Drugs
Financial Institutions/Credit Unions• Personal Financial Documents• Credit Card Information
Defense/Manufacturing• ITAR related information• Intellectual Property
Retail• Credit Card Information• Email Addresses & Contact Details
STEALTHbits TechnologiesAll About Data. Some Statistics
In the United States, the average cost per organization for data breach incidents was $5.4 million last yearo 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013
Through 2016, the financial impact of cybercrime will grow 10 percent per yearo www.gartner.com, Gartner ., December 2011
In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies.o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
STEALTHbits TechnologiesAll About Data. How it Works
Discovery & Risk Profiling Find Sensitive Data Remediate & Report
• Where is the data?• Where does the greatest risk
exist?• What does risk mean to you?
• What kind of sensitive content is out there?
• Who has access to it? How did they get that access?
• Delete, Copy, Move/Consolidate Sensitive Content
• Report on findings and access rights
A Proven, 3-Step Workflow
STEALTHbits TechnologiesAll About Data. StealthSEEK® Roadmap
What’s next in the queue?
Owner Notification Workflow
Office 365 support, SharePoint scanning – v3.x (Q4 2014)
Data Classification and Tagging
STEALTHbits TechnologiesAll About Data.
Attend a Demoo www.stealthbits.com/events
Next Steps
Request a Trialo www.stealthbits.com/trial
Learn Moreo www.stealthbits.com/resources
Ask Us a Questiono www.stealthbits.com/company/contact-us
FREE 30-Day StealthSEEK Trial!
http://www.stealthbits.com/trial