DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats

1,003 views

Published on

Risks related to total visibility and control over their data (unstructued and semi-structured), ensuring that only the right users have access to the right data at all times

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,003
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
40
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats

  1. 1. Eliminating Data Security ThreatsDaniel Gutman, Varonis Systems© 2012 Varonis Systems. Proprietary and confidential.
  2. 2. Data? What data?© 2012 Varonis Systems. Proprietary and confidential.
  3. 3. Unstructured & Semi Structured Data PERCENTAGE OF THE DIGITAL UNIVERSE 2007 2011 50% 40% 30% 20% 10% 650% growth 0% Security-Intense Compliance- Intense in the next 5 Preservation- Intense Source: IDC years!© 2012 Varonis Systems. Proprietary and confidential.
  4. 4. Data Explosion – Are We Ready? MORE 91% Can IT answer?  Who has access to this folder? + Data + Collaboration Lack processes for  Which folders does this user or + Cross-Functional Teams determining data group have access to? + Security Requirements ownership  Who has been accessing this = folder? MORE Containers MORE ACLs 76%  Which data is sensitive?  Who is the data owner? MORE Management Unable to determine  Where is my sensitive data who can access overexposed?  How do I fix it? unstructured data  Where do I begin? SOURCE: PONEMON INSTITUTE Page 4© 2012 Varonis Systems. Proprietary and confidential.
  5. 5. Functional Relationships in 10TB, 1000 Users Page 5© 2010 Varonis Systems. Proprietary and confidential.
  6. 6. Secure Collaboration Maximizes Value Maximum Value Too much access No Access Uncontrolled No Collaboration Correct Access Collaboration Correct Auditng No Value Negative Value (Damage)© 2012 Varonis Systems. Proprietary and confidential.
  7. 7. Survey: 22% reported a data breach Data Breaches Breached 22% Not Breached 78%© 2012 Varonis Systems. Proprietary and confidential.
  8. 8. Breach has cost© 2012 Varonis Systems. Proprietary and confidential.
  9. 9. 43% of Breaches by “Trusted” Insiders© 2012 Varonis Systems. Proprietary and confidential.
  10. 10. So, how do we protect our data?© 2012 Varonis Systems. Proprietary and confidential.
  11. 11. Data Protection Flow Authentication Authorization Auditing • Authentication Users are who they say they are • Authorization Users have access to only what they need • Auditing Monitor actual access • Alert On unusual activity Page 11© 2012 Varonis Systems. Proprietary and confidential.
  12. 12. If we do that… • Access is controlled No one gets access to data who shouldn’t No data is exposed to people that shouldn’t see it • Access is monitored No one can access data without it being logged Logs are inspected (with automation) • Unusual activity is flagged Humans can investigate the right things Page 12© 2012 Varonis Systems. Proprietary and confidential.
  13. 13. What might this look like?© 2012 Varonis Systems. Proprietary and confidential.
  14. 14. Varonis Metadata Framework• Four types of metadata are collected, synthesized, processed, and presented: File System & Permissions Information User and Group Information Access Activity Sensitive Content Indicators• Actionable data governance information: WHO has access to a data set? WHO should have access to data set? WHO has been accessing it? WHICH data is sensitive? WHO is the data owner? WHERE is my sensitive data overexposed, and how do I fix it?• Allows data owners to participate in data governance: Automated Entitlement reviews Authorization workflows Foundation for Secure Collaboration Page 14
  15. 15. Varonis Data Governance Life Cycle Data Owner Participation Identify •Review Access Sensitive •Examine Activity Folders & Files •Review Stale Data Remediate Excessive Permissions Profile Data Use •All file activity will be monitored by •Global Group Access Varonis •Stale Group Memberships Data to Business Alignment Prioritize Based •Identify Demarcation Containers on Content & •Identify Data Owners Exposure© 2011 Varonis Systems. Proprietary and confidential.
  16. 16. Permissions - Bi-Directional Visibility Users/Groups… to Users/Groups to Data Data…© 2012 Varonis Systems. Proprietary and confidential.
  17. 17. Audit Trail Search, Sort, and Group© 2012 Varonis Systems. Proprietary and confidential.
  18. 18. Actionable Data • Prioritized list of folders that should be Sensitive Dataaddressed Exposed Data Top folders that contain a large percentage of sensitive data -AND- Have excessive/loose permissions Page 18© 2012 Varonis Systems. Proprietary and confidential.
  19. 19. Activity Analysis • Most/Least Active Users • Most/Least Active Directories • Anomalous Behavior© 2012 Varonis Systems. Proprietary and confidential.
  20. 20. Data Ownership Identification Active Users© 2012 Varonis Systems. Proprietary and confidential.
  21. 21. Reports – Automatic for Owners Activity Permissions© 2011 Varonis Systems. Proprietary and confidential.
  22. 22. Data Owner Involvement • Entitlement Reviews • Authorization Workflow • Self Service Portal • Automated Rules Page 22© 2011 Varonis Systems. Proprietary and confidential.
  23. 23. Improving Today’s Environments with Automation • Data is accessible to manythe right users accessible to only users • Access is rarely reviewed reviewed regularly Owners will be identified based a metadata, assigned, 91% of organizations don’t haveonprocess to identify data tracked owners & involved Permissions reports will be created a permissions report 76% of organizations can’t produce and sent automatically (Source: Ponemon Institute) • User access is audited continuously • User access is rarely audited • User access is analyzed automatically • User access is rarely analyzed • Unused data is automatically moved or deleted • Unused data is left at-risk Page 23© 2012 Varonis Systems. Proprietary and confidential.
  24. 24. Varonis: Immediate Operational and Financial Benefits Ensuring appropriate access & permissions Finding lost, moved, copied files Audit & Analyze Data Use Activity Permissions Analysis & Testing Data ownership identification Storage cost savings Significant, quantifiable return on investment Page 24© 2008 Varonis Systems. Proprietary and confidential.
  25. 25. Thank You! Daniel Gutman daniel@varonis.com Page 25© 2012 Varonis Systems. Proprietary and confidential.
  26. 26. IDU Multi-tiered Architecture Page 26© 2011 Varonis Systems. Proprietary and confidential.
  27. 27. Архитектура Varonis IDU Page 27© 2008 Varonis Systems. Proprietary and confidential.

×