eliminating data security threats presented by: michael hartman varonis systems. proprietary and...

25
ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential.

Upload: thomasine-kennedy

Post on 23-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

ELIMINATING DATA SECURITY THREATS

Presented by: Michael Hartman

Page 2: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

ABOUT VARONIS

Founded in 2004, started operations in 2005

Over 1800 Customers

Over 4500 installations

Offices on 6 continents

Based on patented technology and a highly accurate analytics

engine, Varonis solutions give organizations total visibility and

control over their unstructured data, ensuring that only the

right users have access to the right data at all times from all

devices, all use is monitored, and abuse is flagged.

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

Page 3: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

Data?

What data?

Page 4: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

650% growth in the next 5 years!

UNSTRUCTURED DATA

PERCENTAGE OF THE DIGITAL UNIVERSE

Security-IntenseCompliance-Intense

Preservation-Intense

0%

10%

20%

30%

40%

50%2007 2011

Source: IDC

Page 5: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

Can IT answer?

Who has access to this folder?

Which folders does this user

or group have access to?

Who has been accessing this

folder?

Which data is sensitive?

Who is the data owner?

Where is my sensitive data

overexposed?

How do I fix it?

Where do I begin?

DATA EXPLOSION – ARE WE READY?

91% Lack processes for

determining data

ownership

76%Unable to determine who

can access unstructured

data

Varonis Systems. Proprietary and confidential.

+ Data+ Collaboration

+ Cross-Functional Teams

+ Security

Requirements=

MORE ContainersMORE ACLs

MORE Management

SOURCE: PONEMON INSTITUTE

MORE

Page 6: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

SURVEY: 22% REPORTED A DATA BREACH

Breached22%

Not Breached

78%

Data Breaches

Page 7: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

$7.2 MILLION PER BREACH

Page 8: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

43% OF BREACHES BY “TRUSTED” INSIDERS

Page 9: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

SECURE COLLABORATION MAXIMIZES VALUE

Too much access

UncontrolledCollaboration

No AccessNo Collaboration

MaximumValue

Negative Value (Damage)

Correct AccessCorrect AuditingNo Value

Page 10: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

So, how do we protect our data?

Page 11: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

DATA PROTECTION FLOW

Authentication

Users are who they say they are

Authorization

Users have access to only what they need

Auditing

Monitor actual access

Alert

On unusual activityVaronis Systems. Proprietary and confidential.

Authentication

Authorization Auditing

ALERT!

Page 12: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

IF WE DO THAT…

Access is controlled

No one gets access to data who shouldn’t

No data is exposed to people that shouldn’t see it

Access is monitored

No one can access data without it being logged

Logs are inspected (with automation)

Unusual activity is flagged

Humans can investigate the right things

Page 13: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

What might this look like?

Page 14: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

PERMISSIONS - BI-DIRECTIONAL VISIBILITY

Varonis Systems. Proprietary and confidential.

Page 15: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

AUDIT TRAIL

Varonis Systems. Proprietary and confidential.

Page 16: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

QUOTE FROM A CSO ON DLP

“Yesterday I had one

problem: where’s my

sensitive data?

Today I have 193,000

problems.”

Page 17: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

ACTIONABLE DATA

Varonis Systems. Proprietary and confidential.

Sensitive Data Exposed Data• Prioritized list of folders that should be

addressedTop folders that contain a large percentage of sensitive data

-AND-

Have excessive/loose permissions

Page 18: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

ACTIVITY ANALYSIS

Varonis Systems. Proprietary and confidential.

• Most/Least Active Users• Most/Least Active Directories• Anomalous Behavior

• Most/Least Active Users• Most/Least Active Directories• Anomalous Behavior

Page 19: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

RECOMMENDATIONS AND MODELING

Page 20: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

HBR ON DATA OWNERS

You don't manage people assets the same way you manage capital assets. Nor should you manage data assets in the same way you manage technology

assets. This may be the most fundamental reason for moving responsibility for data out of IT.

http://blogs.hbr.org/cs/2012/10/get_responsiblity_for_data_out.html

Page 21: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

DATA OWNERSHIP IDENTIFICATION

Varonis Systems. Proprietary and confidential.

Active UsersActive Users

Page 22: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

REPORTS – AUTOMATIC FOR OWNERS

Varonis Systems. Proprietary and confidential.

PermissionsPermissions

ActivityActivity

Page 23: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

IMPROVING DATA SECURITY WITH AUTOMATION

Data is accessible to only the right users

Access is reviewed regularly

Owners will be identified based on metadata, assigned,

tracked & involved

Permissions reports will be created and sent automatically

User access is audited continuously

User access is analyzed automatically

Unused data is automatically moved or deleted

Varonis Systems. Proprietary and confidential.

Page 24: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

REDUCED RISK, BETTER PROCESS

Varonis Systems. Proprietary and confidential.

Trust• Access is restricted• Data owners

identified• Owners Review

Access

Verify• Access Audited• Usage analyzed• Less will arrive at

endpoints

Page 25: ELIMINATING DATA SECURITY THREATS Presented by: Michael Hartman Varonis Systems. Proprietary and confidential

VARONIS SYSTEMS. PROPRIETARY AND CONFIDENTIAL.

Free 30 day trial!Assess your company’s data security threats.