stealthbits sensitive data discovery solutions
DESCRIPTION
STEALTHbits offers a "Top-Down" and "Bottom-Up" approach to Sensitive Data Discovery. Learn more about both of them in this brief presentation.TRANSCRIPT
![Page 1: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/1.jpg)
STEALTHbits Technologies, Inc.Sensitive Data Discovery
Solutions
![Page 2: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/2.jpg)
STEALTHbits TechnologiesAll About Data. Agenda
About STEALTHbits Sensitive Data Discovery – Top/Down or Bottom/Up? Product Overview
o Use Caseso Statisticso How it Workso Roadmap
Product Demonstration
![Page 3: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/3.jpg)
STEALTHbits TechnologiesAll About Data. Sensitive Data Discovery
Top – Down: Integrated Sensitive Data Discovery
Bottom – Up: Focused Sensitive Data Discovery
StealthAUDIT®
Utilize Sensitive Data Discovery to enrich the
context of Unstructured Data during Data Access
Governance processes.StealthSEEK®
The solution for those tasked with Sensitive Data Discovery
and tactical remediation of issues like permissions,
misuse, and improper storage of Sensitive Data.
![Page 4: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/4.jpg)
STEALTHbits TechnologiesAll About Data. What is StealthSEEK®?
StealthSEEK is:o Tactical Sensitive Data
Discoveryo Easy-to-Useo Flexible &
Customizableo Scalableo Intelligent
![Page 5: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/5.jpg)
STEALTHbits TechnologiesAll About Data. StealthSEEK® Use Cases
StealthSEEK is used for:
Compliance Fulfillmento PCI-DSS, HIPAA/HITECH, SOX, GLBA,
FERPA, ITAR, and more
Proactive Risk Mitigationo Set up best practices to proactively avoid
untoward incidents
Incident Responseo Respond to data breach events or failed
audits
Who Uses StealthSEEK?
Universities/Higher Education• Student and Faculty Info (SSN, Birth Dates, etc.)• Health Records• Financial Aid Records
Healthcare/Hospitals• Health Records• Patient Data• Prescription Drugs
Financial Institutions/Credit Unions• Personal Financial Documents• Credit Card Information
Defense/Manufacturing• ITAR related information• Intellectual Property
Retail• Credit Card Information• Email Addresses & Contact Details
![Page 6: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/6.jpg)
STEALTHbits TechnologiesAll About Data. Some Statistics
In the United States, the average cost per organization for data breach incidents was $5.4 million last yearo 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013
Through 2016, the financial impact of cybercrime will grow 10 percent per yearo www.gartner.com, Gartner ., December 2011
In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies.o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
![Page 7: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/7.jpg)
STEALTHbits TechnologiesAll About Data. How it Works
Discovery & Risk Profiling Find Sensitive Data Remediate & Report
• Where is the data?• Where does the greatest risk
exist?• What does risk mean to you?
• What kind of sensitive content is out there?
• Who has access to it? How did they get that access?
• Delete, Copy, Move/Consolidate Sensitive Content
• Report on findings and access rights
A Proven, 3-Step Workflow
![Page 8: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/8.jpg)
STEALTHbits TechnologiesAll About Data. StealthSEEK® Roadmap
What’s next in the queue?
Owner Notification Workflow
Office 365 support, SharePoint scanning – v3.x (Q4 2014)
Data Classification and Tagging
![Page 9: STEALTHbits Sensitive Data Discovery Solutions](https://reader033.vdocuments.us/reader033/viewer/2022061121/546f9039b4af9f3f0b8b45bf/html5/thumbnails/9.jpg)
STEALTHbits TechnologiesAll About Data.
Attend a Demoo www.stealthbits.com/events
Next Steps
Request a Trialo www.stealthbits.com/trial
Learn Moreo www.stealthbits.com/resources
Ask Us a Questiono www.stealthbits.com/company/contact-us
FREE 30-Day StealthSEEK Trial!
http://www.stealthbits.com/trial