SlideShare a Scribd company logo
1 of 31
Download to read offline
It’s All About Insight
Agenda
1 Introduction
2 Locate
3 Protect
4 Monitor
© 2017 Veritas Technologies LLC2
Unknowns of Unstructured Data
What
data is
out
there?
Who
owns this
data?
Who can
access
this data? Where
should I
store this
data?
Who is
using this
data?
How is
this data
being
used?
What is the
Value of
this data?
Is the
information
storage
compliant?
© 2017 Veritas Technologies LLC3
File
Metadata
Size
Size on
Disk
Modify
Date
Access
Date
Create
Date
Creator
Risk
Score
User
Activity
Effective
Permissions
Share
Group
Structure
Protect
Bit Allows
Denies
User
SIDS
Nested
Groups
ACL
Content
Classification
PII
Credit
Card
User
Credentials Confidential
CanWe Locate Data
When it’s Dark?
© 2017 Veritas Technologies LLC4
Data Insight Multi-dimensional Classification
Age
Type
Size
Last accessed
Server
Location
Content
Policy
Created
date
User
Risk
Resource
Risk
© 2017 Veritas Technologies LLC5
Personally
Identifiable
Information
Confidential
De-Structured
• Proximity searching
• Regular expressions
• Dictionaries of sensitive types and terms
• Built-in Patterns
• Checksum validation
–LUHN
• Confidence ranges
• Keywords
• Incremental scans based on DI Forensics
reduces unnecessary re-scans
Target Content with Classification
© 2017 Veritas Technologies LLC6
Locate
© 2017 Veritas Technologies LLC7
Locate DifferentTypes of PII
Integrated Classification Engine
Define and Locate PII relevant to
GDPR or other Regulations
Scan all data at rest
Old Data
Newly created data
As writes occur
Keep a fresh and reliable Data
Map using intelligent classification
Updated policies constantly on
the way
© 2017 Veritas Technologies LLC8
Smart Classification
Find PII Efficiently
Machine Learning based Classification Prioritization
Continuous growth of unstructured data creates
a scale problem for inspecting file content
Predictive algorithm uses DI context to find
the data most likely to contain tagged data
Find PII more quickly within Dark Data for a
quicker time to value
© 2017 Veritas Technologies LLC9
Targeted Classification
Ensure Relevancy and Freshness
Use reports to target users who author
data for near time classification
• Scope users by
– Attribute
– Risk Score
• Scope files by
– Extension
– Risk Score
– Location
Department Citizenship
JobTitle
© 2017 Veritas Technologies LLC10
FindanyCustomer
PIIonshares
accessibletothe
EveryoneGroup,or
anyonenotin
DepartmentX
Find any
Customer PII that
was accessed by
User X between
time A and B
Did anyone
access this file
containing
Employee PII
while it was on an
inappropriate
share?
Locate Sample Questions
Find any stale
and orphaned
files we can
move/eliminate
I need to find the
person
responsible for
this sensitive file
© 2017 Veritas Technologies LLC11
Protect
© 2017 Veritas Technologies LLC12
Protect
“I need to
evaluate those
that can access
this data to
ensure only
authorized
people can
access.”
© 2017 Veritas Technologies LLC13
How Does a User Get to a file?
© 2017 Veritas Technologies LLC14
Is the Security Appropriate?
Contractor
Customer
PII
Contractor
Modify this group
© 2017 Veritas Technologies LLC15
Review and Attest
• Automatically guide
custodians through
reviewing security on their
data
• Provide audited proof of
approval from custodians
• Provide action plans for
remediation
Simplified Custodian
Entitlements Review and
Attestation
© 2017 Veritas Technologies LLC16
Inform Custodians with User and File Metadata
• Allow Custodians to see if
sensitive data is present
• Allow Custodians to see if users
are even actively using assigned
permissions
• Show user metadata to help
custodians understand types of
users with access to this data
Provide Custodians with enough data to
make informed decisions on access
Portal Options
© 2017 Veritas Technologies LLC17
Monitor
© 2017 Veritas Technologies LLC18
Monitor
“I need to track
users of
interest, or any
users interacting
with a file in
question”
“I want to look
for abnormal
behavior so I can
find suspicious
users, or
compromised
accounts”
© 2017 Veritas Technologies LLC19
Forensics Investigations / Alerts
High Risk
Users
Person of
Interest
Sensitive Data
Access Alerts
Group /
Like Users
© 2017 Veritas Technologies LLC20
Forensics Benefits
Risk
Regulatory
Protected Data
Activity Derived
Inferred
Ownership
Entitlements /
IPAC
© 2017 Veritas Technologies LLC21
Access Forensics
© 2017 Veritas Technologies LLC22
User Risk -Visualization
• Integrated Relative
User Risk Score
• Simple Risk
Assessment
Understand High
Risk Users and the
DataThey Interact
With
© 2017 Veritas Technologies LLC23
Resource Risk
• Resource Risk
Prioritization
• Incorporate Risky
User Action
• Action Prioritization
Understand Risk and
Prioritize Action
© 2017 Veritas Technologies LLC24
Risk Dossier
© 2017 Veritas Technologies LLC25
Risk Dossier
© 2017 Veritas Technologies LLC26
InsiderThreat
• Social Networking Map
Combined with Risk Score
Changes InsiderThreat
Tracking
• Proactive RealTime Alerts
to Mitigate Damage
Find the Risky Behavior
Before it’s a Problem
© 2017 Veritas Technologies LLC27
RealTime Alerts
• Continuous monitoring
of sensitive data
• Quick alerting and
response
• Minimize damage
Faster Response to
High Risk Events
© 2017 Veritas Technologies LLC28
Bringing itTogether to Identify Information
© 2017 Veritas Technologies LLC29
Data Insight
Q&A
© 2017 Veritas Technologies LLC30
Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
ThankYou

More Related Content

What's hot

What's hot (20)

Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
 
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudNetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Keeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads ProtectedKeeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads Protected
 
Raising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudRaising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloud
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 
Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloud
 
AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 
AWSome Data Protection with Backup Exec
AWSome Data Protection with Backup ExecAWSome Data Protection with Backup Exec
AWSome Data Protection with Backup Exec
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
 
Track technologique modernize data protection
Track technologique modernize data protectionTrack technologique modernize data protection
Track technologique modernize data protection
 
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesTop 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
 
Reduce Your Data Footprint
Reduce Your Data FootprintReduce Your Data Footprint
Reduce Your Data Footprint
 
Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1
 

Similar to It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data

Sharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical viewSharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical view
Open City Foundation
 

Similar to It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data (20)

Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
 
Peter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of dataPeter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of data
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast Start
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
Sharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical viewSharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical view
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 

More from Veritas Technologies LLC

More from Veritas Technologies LLC (20)

Veritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, TurkeyVeritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, Turkey
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
 
Get trust and confidence to manage your data in hybrid it environments japanese
 Get trust and confidence to manage your data in hybrid it environments japanese Get trust and confidence to manage your data in hybrid it environments japanese
Get trust and confidence to manage your data in hybrid it environments japanese
 
VSD Madrid 2019
VSD Madrid 2019VSD Madrid 2019
VSD Madrid 2019
 
VSD Istanbul 2018
VSD Istanbul 2018VSD Istanbul 2018
VSD Istanbul 2018
 
VSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco ServicesVSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco Services
 
VSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public SectorVSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public Sector
 
VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
 
VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
Nutanix .NEXT London 2018
Nutanix .NEXT London 2018  Nutanix .NEXT London 2018
Nutanix .NEXT London 2018
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital Transformation
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and Simplicity
 
VSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data OpportunityVSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data Opportunity
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScale
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data

  • 2. Agenda 1 Introduction 2 Locate 3 Protect 4 Monitor © 2017 Veritas Technologies LLC2
  • 3. Unknowns of Unstructured Data What data is out there? Who owns this data? Who can access this data? Where should I store this data? Who is using this data? How is this data being used? What is the Value of this data? Is the information storage compliant? © 2017 Veritas Technologies LLC3
  • 5. Data Insight Multi-dimensional Classification Age Type Size Last accessed Server Location Content Policy Created date User Risk Resource Risk © 2017 Veritas Technologies LLC5
  • 6. Personally Identifiable Information Confidential De-Structured • Proximity searching • Regular expressions • Dictionaries of sensitive types and terms • Built-in Patterns • Checksum validation –LUHN • Confidence ranges • Keywords • Incremental scans based on DI Forensics reduces unnecessary re-scans Target Content with Classification © 2017 Veritas Technologies LLC6
  • 7. Locate © 2017 Veritas Technologies LLC7
  • 8. Locate DifferentTypes of PII Integrated Classification Engine Define and Locate PII relevant to GDPR or other Regulations Scan all data at rest Old Data Newly created data As writes occur Keep a fresh and reliable Data Map using intelligent classification Updated policies constantly on the way © 2017 Veritas Technologies LLC8
  • 9. Smart Classification Find PII Efficiently Machine Learning based Classification Prioritization Continuous growth of unstructured data creates a scale problem for inspecting file content Predictive algorithm uses DI context to find the data most likely to contain tagged data Find PII more quickly within Dark Data for a quicker time to value © 2017 Veritas Technologies LLC9
  • 10. Targeted Classification Ensure Relevancy and Freshness Use reports to target users who author data for near time classification • Scope users by – Attribute – Risk Score • Scope files by – Extension – Risk Score – Location Department Citizenship JobTitle © 2017 Veritas Technologies LLC10
  • 11. FindanyCustomer PIIonshares accessibletothe EveryoneGroup,or anyonenotin DepartmentX Find any Customer PII that was accessed by User X between time A and B Did anyone access this file containing Employee PII while it was on an inappropriate share? Locate Sample Questions Find any stale and orphaned files we can move/eliminate I need to find the person responsible for this sensitive file © 2017 Veritas Technologies LLC11
  • 12. Protect © 2017 Veritas Technologies LLC12
  • 13. Protect “I need to evaluate those that can access this data to ensure only authorized people can access.” © 2017 Veritas Technologies LLC13
  • 14. How Does a User Get to a file? © 2017 Veritas Technologies LLC14
  • 15. Is the Security Appropriate? Contractor Customer PII Contractor Modify this group © 2017 Veritas Technologies LLC15
  • 16. Review and Attest • Automatically guide custodians through reviewing security on their data • Provide audited proof of approval from custodians • Provide action plans for remediation Simplified Custodian Entitlements Review and Attestation © 2017 Veritas Technologies LLC16
  • 17. Inform Custodians with User and File Metadata • Allow Custodians to see if sensitive data is present • Allow Custodians to see if users are even actively using assigned permissions • Show user metadata to help custodians understand types of users with access to this data Provide Custodians with enough data to make informed decisions on access Portal Options © 2017 Veritas Technologies LLC17
  • 18. Monitor © 2017 Veritas Technologies LLC18
  • 19. Monitor “I need to track users of interest, or any users interacting with a file in question” “I want to look for abnormal behavior so I can find suspicious users, or compromised accounts” © 2017 Veritas Technologies LLC19
  • 20. Forensics Investigations / Alerts High Risk Users Person of Interest Sensitive Data Access Alerts Group / Like Users © 2017 Veritas Technologies LLC20
  • 21. Forensics Benefits Risk Regulatory Protected Data Activity Derived Inferred Ownership Entitlements / IPAC © 2017 Veritas Technologies LLC21
  • 22. Access Forensics © 2017 Veritas Technologies LLC22
  • 23. User Risk -Visualization • Integrated Relative User Risk Score • Simple Risk Assessment Understand High Risk Users and the DataThey Interact With © 2017 Veritas Technologies LLC23
  • 24. Resource Risk • Resource Risk Prioritization • Incorporate Risky User Action • Action Prioritization Understand Risk and Prioritize Action © 2017 Veritas Technologies LLC24
  • 25. Risk Dossier © 2017 Veritas Technologies LLC25
  • 26. Risk Dossier © 2017 Veritas Technologies LLC26
  • 27. InsiderThreat • Social Networking Map Combined with Risk Score Changes InsiderThreat Tracking • Proactive RealTime Alerts to Mitigate Damage Find the Risky Behavior Before it’s a Problem © 2017 Veritas Technologies LLC27
  • 28. RealTime Alerts • Continuous monitoring of sensitive data • Quick alerting and response • Minimize damage Faster Response to High Risk Events © 2017 Veritas Technologies LLC28
  • 29. Bringing itTogether to Identify Information © 2017 Veritas Technologies LLC29 Data Insight
  • 30. Q&A © 2017 Veritas Technologies LLC30
  • 31. Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. ThankYou