More Related Content Similar to It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data (20) More from Veritas Technologies LLC (20) It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data3. Unknowns of Unstructured Data
What
data is
out
there?
Who
owns this
data?
Who can
access
this data? Where
should I
store this
data?
Who is
using this
data?
How is
this data
being
used?
What is the
Value of
this data?
Is the
information
storage
compliant?
© 2017 Veritas Technologies LLC3
5. Data Insight Multi-dimensional Classification
Age
Type
Size
Last accessed
Server
Location
Content
Policy
Created
date
User
Risk
Resource
Risk
© 2017 Veritas Technologies LLC5
8. Locate DifferentTypes of PII
Integrated Classification Engine
Define and Locate PII relevant to
GDPR or other Regulations
Scan all data at rest
Old Data
Newly created data
As writes occur
Keep a fresh and reliable Data
Map using intelligent classification
Updated policies constantly on
the way
© 2017 Veritas Technologies LLC8
9. Smart Classification
Find PII Efficiently
Machine Learning based Classification Prioritization
Continuous growth of unstructured data creates
a scale problem for inspecting file content
Predictive algorithm uses DI context to find
the data most likely to contain tagged data
Find PII more quickly within Dark Data for a
quicker time to value
© 2017 Veritas Technologies LLC9
10. Targeted Classification
Ensure Relevancy and Freshness
Use reports to target users who author
data for near time classification
• Scope users by
– Attribute
– Risk Score
• Scope files by
– Extension
– Risk Score
– Location
Department Citizenship
JobTitle
© 2017 Veritas Technologies LLC10
13. Protect
“I need to
evaluate those
that can access
this data to
ensure only
authorized
people can
access.”
© 2017 Veritas Technologies LLC13
14. How Does a User Get to a file?
© 2017 Veritas Technologies LLC14
15. Is the Security Appropriate?
Contractor
Customer
PII
Contractor
Modify this group
© 2017 Veritas Technologies LLC15
16. Review and Attest
• Automatically guide
custodians through
reviewing security on their
data
• Provide audited proof of
approval from custodians
• Provide action plans for
remediation
Simplified Custodian
Entitlements Review and
Attestation
© 2017 Veritas Technologies LLC16
17. Inform Custodians with User and File Metadata
• Allow Custodians to see if
sensitive data is present
• Allow Custodians to see if users
are even actively using assigned
permissions
• Show user metadata to help
custodians understand types of
users with access to this data
Provide Custodians with enough data to
make informed decisions on access
Portal Options
© 2017 Veritas Technologies LLC17
19. Monitor
“I need to track
users of
interest, or any
users interacting
with a file in
question”
“I want to look
for abnormal
behavior so I can
find suspicious
users, or
compromised
accounts”
© 2017 Veritas Technologies LLC19
20. Forensics Investigations / Alerts
High Risk
Users
Person of
Interest
Sensitive Data
Access Alerts
Group /
Like Users
© 2017 Veritas Technologies LLC20
23. User Risk -Visualization
• Integrated Relative
User Risk Score
• Simple Risk
Assessment
Understand High
Risk Users and the
DataThey Interact
With
© 2017 Veritas Technologies LLC23
24. Resource Risk
• Resource Risk
Prioritization
• Incorporate Risky
User Action
• Action Prioritization
Understand Risk and
Prioritize Action
© 2017 Veritas Technologies LLC24
27. InsiderThreat
• Social Networking Map
Combined with Risk Score
Changes InsiderThreat
Tracking
• Proactive RealTime Alerts
to Mitigate Damage
Find the Risky Behavior
Before it’s a Problem
© 2017 Veritas Technologies LLC27
28. RealTime Alerts
• Continuous monitoring
of sensitive data
• Quick alerting and
response
• Minimize damage
Faster Response to
High Risk Events
© 2017 Veritas Technologies LLC28
31. Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
ThankYou