VARONIS – Importance of management of                   unstructured dataEdward Wasilchin, Regional Manager Scandinavia & ...
What is information security      RIGHT information      RIGHT user      RIGHT time                                       ...
Unstructured data explosion         PERCENTAGE OF THE DIGITAL UNIVERSE       50%       40%                    2007        ...
Risks, controls & regulations                      High Risk Levels                      • File System data is at great ri...
Multiple collaboration platforms              Windows                                         UNIX    SharePoint          ...
Access controls protect unstructured data       • Authentication: Who you are       • Authorization: What you can do      ...
Why Unstructured Data Is At Risk       Roles change constantly                                                            ...
Information security starts here       • RIGHT information RIGHT user RIGHT time       • Generates questions like;        ...
Question 1; Who has access?                                                        Windows                 TODAY          ...
With VARONIS; Dynamic Bi-Directional Visibility                                                        Windows            ...
Question 2; Who is accessing?            TODAY                                       Windows          Silo Based          ...
With VARONIS; Full Audit Trail                                                        Search, Sort, and Group© 2008 Varoni...
Question 3; Who SHOULD have access?           TODAY          Permission         Revocation –            Manual error      ...
With VARONIS; Actionable Recommendations                                                        By User                   ...
Question 4; Who is the DATAOWNER?          TODAY       Ask someone!© 2008 Varonis Systems. Proprietary and confidential.
With VARONIS; Data Ownership Identification                                                        Active Users© 2008 Varo...
With VARONIS; Business Oriented and Automated        Authorization Workflow© 2008 Varonis Systems. Proprietary and confide...
Question 5; Where is my CRITICAL data and WHO has access?           TODAY        Complex DLP         Suites/Tools© 2008 Va...
With VARONIS; Identify Risk – Over-exposed Sensitive Data
Varonis & Its Customers                                                        Page 21© 2008 Varonis Systems. Proprietary ...
About Varonis Systems Inc• Varonis Systems Inc   leading innovator in   comprehensive Data                              Da...
Who Needs Varonis Data Governance?        Varonis Publicly Referenced Customers             Over 1000 Customers & 3000 Ins...
The Business Value of Varonis Solutions        • Increased data protection                       Automation reduces errors...
Want to know for yourself?       • DSS offers free audit of your environment;                      Who CAN access informat...
Upcoming SlideShare
Loading in …5
×

Varonis - DSS @VILNIUS 2010

1,171 views

Published on

Varonis Systems works in previously never solved but important area of security - the high risk of access and usage of our unstructured data. Windows / Unix / Linux fileservers, Microsoft Exchange, Microsoft Sharepoint, NAS and so on holds millions of PDF's, PPT's, DOC's, XLS's and other unstructured information which without Varonis Systems DatAdvantage is hard to manage.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,171
On SlideShare
0
From Embeds
0
Number of Embeds
29
Actions
Shares
0
Downloads
62
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Varonis - DSS @VILNIUS 2010

  1. 1. VARONIS – Importance of management of unstructured dataEdward Wasilchin, Regional Manager Scandinavia & BalticsM; +46708105878 | Email; edward@varonis.com© 2008 Varonis Systems. Proprietary and confidential.
  2. 2. What is information security RIGHT information RIGHT user RIGHT time Page 2© 2008 Varonis Systems. Proprietary and confidential.
  3. 3. Unstructured data explosion PERCENTAGE OF THE DIGITAL UNIVERSE 50% 40% 2007 2011 80% of all data is unstructured or 30% semi-structured 650% 20% 10% growth over 0% Security-Intense Compliance- Preservation- the next 5 years Intense Intense Source: IDC Source: Gartner Jan 2010© 2010 Varonis Systems. Proprietary and confidential.
  4. 4. Risks, controls & regulations High Risk Levels • File System data is at great risk for loss, theft, and misuse • Access configuration changes are untested File System Control Gaps • Many access controls are “loose,” even broken • No audit trail exists • More than half of data has no known business owner Regulatory Requirements • BASEL II • PCI • Sarbanes Oxley/EURO SOX Page 4© 2010 Varonis Systems. Proprietary and confidential.
  5. 5. Multiple collaboration platforms Windows UNIX SharePoint NAS Exchange Page 5© 2010 Varonis Systems. Proprietary and confidential.
  6. 6. Access controls protect unstructured data • Authentication: Who you are • Authorization: What you can do • Auditing: What you did© 2008 Varonis Systems. Proprietary and confidential.
  7. 7. Why Unstructured Data Is At Risk Roles change constantly Data access has no business (job change, promotion, project) context (read, write, execute) Question: What links users to data? User/ Data/File Servers Directory Services File Directory name IT Directory Server Security Name File type Helpdesk Managers Admins Admins Department Access Controls Group Membership (Read, Write, etc.) Other identity info, etc. Answer: People without context for data ownership or rightful data use Reality: Nearly 100% of organizations today are NOT able to realize effective and rightful access to business data. Access rights are “inherited” not warranted.© 2008 Varonis Systems. Proprietary and confidential.
  8. 8. Information security starts here • RIGHT information RIGHT user RIGHT time • Generates questions like; Who CAN access information? Who IS accessing information? Who SHOULD have access to information? Who is the OWNER? Where is my CRITICAL information? Page 8© 2008 Varonis Systems. Proprietary and confidential.
  9. 9. Question 1; Who has access? Windows TODAY Manually Sharepoint UNIX NAS© 2008 Varonis Systems. Proprietary and confidential.
  10. 10. With VARONIS; Dynamic Bi-Directional Visibility Windows Sharepoint Users/Groups… UNIX NAS to Users/Groups to Data Data…© 2008 Varonis Systems. Proprietary and confidential.
  11. 11. Question 2; Who is accessing? TODAY Windows Silo Based Access Logs Sharepoint UNIX NAS© 2008 Varonis Systems. Proprietary and confidential.
  12. 12. With VARONIS; Full Audit Trail Search, Sort, and Group© 2008 Varonis Systems. Proprietary and confidential.
  13. 13. Question 3; Who SHOULD have access? TODAY Permission Revocation – Manual error prune processes!© 2008 Varonis Systems. Proprietary and confidential.
  14. 14. With VARONIS; Actionable Recommendations By User What if? Excess Permissions?© 2008 Varonis Systems. Proprietary and confidential.
  15. 15. Question 4; Who is the DATAOWNER? TODAY Ask someone!© 2008 Varonis Systems. Proprietary and confidential.
  16. 16. With VARONIS; Data Ownership Identification Active Users© 2008 Varonis Systems. Proprietary and confidential.
  17. 17. With VARONIS; Business Oriented and Automated Authorization Workflow© 2008 Varonis Systems. Proprietary and confidential.
  18. 18. Question 5; Where is my CRITICAL data and WHO has access? TODAY Complex DLP Suites/Tools© 2008 Varonis Systems. Proprietary and confidential.
  19. 19. With VARONIS; Identify Risk – Over-exposed Sensitive Data
  20. 20. Varonis & Its Customers Page 21© 2008 Varonis Systems. Proprietary and confidential.
  21. 21. About Varonis Systems Inc• Varonis Systems Inc leading innovator in comprehensive Data Data • Effective and scalable Governance Governance data access control Est. 2005 “Framework • Increased and of people, consistent data 220 Employees permissions protection and HQ in NYC USA • Reduction in the cost processes that are and complexity of data 12 Offices WW employed in control proper data • Comprehensive and 2 Support centers use for: granular audit of data use 70% YoY Growth 2
  22. 22. Who Needs Varonis Data Governance? Varonis Publicly Referenced Customers Over 1000 Customers & 3000 Installations…and growing! Solutions are relevant for all sizes of companies in all industries© 2008 Varonis Systems. Proprietary and confidential.
  23. 23. The Business Value of Varonis Solutions • Increased data protection Automation reduces errors & keeps up with ever increasing data volume Intelligence guides decision-making Users Data Continuous auditing improves accountability Varonis Proper access control limits risk of data loss • Improved operational efficiency Automated Data Entitlement Fully leverages existing IT investments (storage, user directories, etc.) Cut Time & Cost of Managing Data Entitlement Saves 90% of the time it takes to review entitlements Generates audit reports in seconds 4© 2008 Varonis Systems. Proprietary and confidential.
  24. 24. Want to know for yourself? • DSS offers free audit of your environment; Who CAN access information? Who IS accessing information? Who SHOULD have access to information? Who is the OWNER? Where is my CRITICAL information? Page 25© 2008 Varonis Systems. Proprietary and confidential.

×