dss itsec conference 2012 - varonis eliminating data security threats

Download DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats

Post on 13-Jan-2015

251 views

Category:

Technology

2 download

Embed Size (px)

DESCRIPTION

Risks related to total visibility and control over their data (unstructued and semi-structured), ensuring that only the right users have access to the right data at all times

TRANSCRIPT

  • 1. Eliminating Data Security ThreatsDaniel Gutman, Varonis Systems 2012 Varonis Systems. Proprietary and confidential.

2. Data? What data? 2012 Varonis Systems. Proprietary and confidential. 3. Unstructured & Semi Structured DataPERCENTAGE OF THE DIGITAL UNIVERSE 2007201150%40%30%20%10%650% growth0%Security-Intense Compliance- Intensein the next 5 Preservation-Intense Source: IDCyears! 2012 Varonis Systems. Proprietary and confidential. 4. Data Explosion Are We Ready? MORE 91%Can IT answer? Who has access to this folder? + Data+ Collaboration Lack processes for Which folders does this user or + Cross-Functional Teams determining datagroup have access to?+ Security Requirements ownership Who has been accessing this=folder? MORE Containers MORE ACLs76% Which data is sensitive? Who is the data owner?MORE ManagementUnable to determine Where is my sensitive datawho can accessoverexposed? How do I fix it?unstructured data Where do I begin? SOURCE: PONEMON INSTITUTE Page 4 2012 Varonis Systems. Proprietary and confidential. 5. Functional Relationships in 10TB, 1000 UsersPage 5 2010 Varonis Systems. Proprietary and confidential. 6. Secure Collaboration Maximizes ValueMaximum Value Too much accessNo AccessUncontrolled No CollaborationCorrect AccessCollaboration Correct AuditngNo ValueNegative Value(Damage) 2012 Varonis Systems. Proprietary and confidential. 7. Survey: 22% reported a data breach Data BreachesBreached22%Not Breached78% 2012 Varonis Systems. Proprietary and confidential. 8. Breach has cost 2012 Varonis Systems. Proprietary and confidential. 9. 43% of Breaches by Trusted Insiders 2012 Varonis Systems. Proprietary and confidential. 10. So, how do we protect our data? 2012 Varonis Systems. Proprietary and confidential. 11. Data Protection Flow Authentication Authorization Auditing AuthenticationUsers are who they say they are AuthorizationUsers have access to only what they need AuditingMonitor actual access AlertOn unusual activity Page 11 2012 Varonis Systems. Proprietary and confidential. 12. If we do that Access is controlled No one gets access to data who shouldnt No data is exposed to people that shouldnt see it Access is monitored No one can access data without it being logged Logs are inspected (with automation) Unusual activity is flagged Humans can investigate the right thingsPage 12 2012 Varonis Systems. Proprietary and confidential. 13. What might this look like? 2012 Varonis Systems. Proprietary and confidential. 14. Varonis Metadata Framework Four types of metadata are collected, synthesized, processed, andpresented: File System & Permissions Information User and Group Information Access Activity Sensitive Content Indicators Actionable data governance information: WHO has access to a data set? WHO should have access to data set? WHO has been accessing it? WHICH data is sensitive? WHO is the data owner? WHERE is my sensitive data overexposed, and how do I fix it? Allows data owners to participate in data governance: Automated Entitlement reviews Authorization workflowsFoundation for Secure CollaborationPage 14 15. Varonis Data Governance Life Cycle Data Owner Participation Identify Review Access Sensitive Examine Activity Folders & Files Review Stale DataRemediate ExcessivePermissions Profile Data UseAll file activity will be monitored byGlobal Group Access VaronisStale Group MembershipsData to Business Alignment Prioritize BasedIdentify Demarcation Containerson Content &Identify Data Owners Exposure 2011 Varonis Systems. Proprietary and confidential. 16. Permissions - Bi-Directional Visibility Users/Groups to Users/Groupsto Data Data 2012 Varonis Systems. Proprietary and confidential. 17. Audit TrailSearch, Sort, and Group 2012 Varonis Systems. Proprietary and confidential. 18. Actionable Data Prioritized list of folders that should be Sensitive Dataaddressed Exposed DataTop folders that contain a large percentage ofsensitive data-AND-Have excessive/loose permissions Page 18 2012 Varonis Systems. Proprietary and confidential. 19. Activity Analysis Most/Least Active Users Most/Least Active Directories Anomalous Behavior 2012 Varonis Systems. Proprietary and confidential. 20. Data Ownership IdentificationActive Users 2012 Varonis Systems. Proprietary and confidential. 21. Reports Automatic for OwnersActivityPermissions 2011 Varonis Systems. Proprietary and confidential. 22. Data Owner Involvement Entitlement Reviews Authorization Workflow Self Service Portal Automated RulesPage 22 2011 Varonis Systems. Proprietary and confidential. 23. Improving Todays Environments with Automation Data is accessible to manythe right usersaccessible to only users Access is rarely reviewedreviewed regularly Owners will be identified based a metadata, assigned, 91% of organizations dont haveonprocess to identify data tracked owners & involved Permissions reports will be created a permissions report 76% of organizations cant produce and sent automatically (Source: Ponemon Institute)User access is audited continuouslyUser access is rarely auditedUser access is analyzed automaticallyUser access is rarely analyzedUnused data is automatically moved or deletedUnused data is left at-risk Page 23 2012 Varonis Systems. Proprietary and confidential. 24. Varonis: Immediate Operational andFinancial BenefitsEnsuring appropriate access & permissionsFinding lost, moved, copied filesAudit & Analyze Data Use ActivityPermissions Analysis & TestingData ownership identificationStorage cost savingsSignificant, quantifiable return on investmentPage 24 2008 Varonis Systems. Proprietary and confidential. 25. Thank You!Daniel Gutman daniel@varonis.com Page 25 2012 Varonis Systems. Proprietary and confidential. 26. IDU Multi-tiered ArchitecturePage 26 2011 Varonis Systems. Proprietary and confidential. 27. Varonis IDUPage 27 2008 Varonis Systems. Proprietary and confidential.